LO2 Flashcards
What does it mean by the vulnerabilities of a computer system?
Any weaknesses within a computer system, network
What are some examples system attacks?
Botnet
DoS
Social engineering
What is a physical threats?
Theft of portable equipment e.g laptop
What are some examples of environmental threats?
Floods
Fire
Earthquakes
What are some examples accidental threats?
spilling liquids on a computer
responding to a phishing email
accidental uploading of malware
accidental deletion of data
What are the intentional threats to cyber security?
hacking
social engineering
DoS
botnet
What are the two types of organised crime?
cyber-enabled crime
cyber-dependent crime
What is state-sponsored threats?
countries spying on each other to obtain information such as nuclear facilities and to spread fake news.
What is the motivation of a hacktivist?
What are the characteristics of a hacktivist?
motivation - politically motivated
characteristics - activities are disruptive rather that destructive, they can be IT professionals
What is the motivation of a cyber criminal?
What are the characteristics of a cyber criminal?
motivation - financial gain, espionage, create havoc
characteristics - often work in organised groups, sells services to highest bidder, includes hackers and IT experts.
What is the motivation for an Insider?
what are the characteristics of an insider?
motivation - personal use, financial gain, revenge
characteristics - lack of self-control, antisocial behaviour, desires revenge
What is the motivation of a script kiddie?
what are the characteristics of a script kiddie?
motivation - wants the power of a hacker without the training
characteristics - teenagers, steal code claiming it as their own, little or no hacking skills
What is the motivation of a vulnerability broker?
what are the characteristics of a vulnerability broker?
motivation - financial gain
characteristics - may have formally been a cyber criminal, high level of IT expertise
What is the motivation of a scammer?
what are the characteristics of a scammer?
motivation - financial gain, identity fraud
characteristics - may ask for money using a hard luck story, will not answer questions about themselves
What is the motivation of a phisher?
What are the characteristics of a phisher?
motivation - financial gain, identity theft
characteristics - can be from anywhere in the world
What is the motivation for cyber terrorist?
what are the characteristics of a cyber terrorist?
motivation - to instil fear in others, righting perceived wrongs
characteristics - can be based anywhere in the world, may have ideological or religious reasons for wanting to terrorise others, high end programming skills
What are the three different targets for cyber security threats?
people
organisations
equipment
What are three impacts of cyber security incidents?
reputation
safety
loss of data
What are three examples of ethical hackers?
IT specialists employed by organisations
organisations monitoring employees
states spying on each other