LO4 Flashcards

1
Q

Cyber security

A

Consists of the processes, practices and technologies designed to protect networks computers, programs and data from attack damage or unauthorised access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An asset

A

An asset is any device, data, or perception that has value to an organisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The goal of cyber security

A

to protect assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Give one tangible asset and one intangible asset

A

A server is tangible
Reputation is intangible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A cyber attack seeks to what

A

Damage, steal or destroy an asset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does a threat have potential for

A

To harm an asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a vunerability

A

A vulnerability is a weakness in an asset or prevention measure which can be exploited in an attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

If we have no vulnerabilities do we have any threats

A

no but this is unrealistic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Prevention measures

A

A prevention measure aims to reduce the risk of an asset being exploited in an attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Does the prevention measure destroy a threat

A

The threat will still exist but the prevention measure may prevent it from ever happening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Mitigation of risks meaning what

A

is reducing the risk of an attack happening or reducing its impact if it does

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What should you do with data once its purpose has run its course

A

Have it be securely destroyed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

securely destroyed data definition

A

The data cannot be retrieved

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does a magnetic wipe destroy data

A

It destroys thew magnetic patterns which store the data, making them random and unreadable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Overwriting advantage + what it is

A

Allows the device to keep working as normal.

It involves replacing the data which is to be destroyed with random data instead.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Morality

A

Morality generally refers to our personal view

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Ethics

A

Ethics generally come from a group or wider society

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Legalisation

A

Some immoral or unethical actions are punishable by law, some are not.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Defamation of character

A

Someone says something untrue about you which causes serious damage to your reputation, it may be both immoral and unethical, and also illegal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What law is designed to protect intellectual property (IP) from being stolen

A

Copyrights, designs and patents Act of (1988)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Copyrights, designs and patents Act of (1988)

A

What law is designed to protect intellectual property (IP) from being stolen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Computer misuse act (1990)

A

Unauthorised access to a computer is illegal and can be punished

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

It can punish and creating malware. Law

A

Computer misuse act (1990)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What makes it illegal to access computer systems without permission

A

The CMA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Health and safety at Work Act (1974)

A

Ensure employers make the work safe for employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Designed to protect personal data from misuse. Law

A

Data protection act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Data protection act described

A

Designed to protect personal data from misuse. Law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What could the DPA help us with

A

Especially sensitive data includes data related to bio metrics, health, political or religious beliefs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

4 principles the DPA implores

A
  • Be fairly and lawfully processed
  • Be processed for limited purposes
  • Be adequate, relevant and not excessive
  • Be accurate and up-to-date.
  • Not be kept longer than is necessary

-Be processed in line with your rights

  • Be kept secure
  • Not be transferred to other countries outside of the European economic area that do not have adequate data protection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

When collecting information especially from a secondary research method you need to consider what factors

A

Who or what the source is

Their agenda or point of view
- which could cause bias

The timeliness and how recent it is

How accurate is it
- can I verify with a second source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Difference between validity and reliability

A

Validity is how believable the information is.

Reliability refers to if it can be verified and/or the source has a reputation for accurate information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A virus works how (3)

A

is a type of malware which inserts itself into other computer programs

When the host program is run, the virus code executes too

When this happens, the virus will replicate itself and spread

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What do you call something that does not require a host program

A

Stand alone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Worms work how (3)

A

Is stand alone
Replicate very quickly
Network worms are the most common, which spread over networks and slow them down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Trojan horse (4)

A

A Trojan horse is malware which is disguised as a useful program but actually contains malicious code

It make take months for a Trojan horse code to start to act maliciously

Most trojans can’t self-replicate

A trojan horse may provide a backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Spyware (1)

A

Collects information about you without your knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Adware (2)

A

Shows lots of advertisements to the user making the developer money, a lot of popups

Are not usually malicous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Ransomware (3)

A

A ransom money is demanded for the release of something

Ransomware threatens to block access to files or release personal information unless a sum of money is paid

Often access is blocked by encrypting the files, and the ransoms are often demanded in a cryptocurrency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Rootkits

A

are usually a collection of malware

A rootkit can be used by an attacker as a backdoor to remotely control a computer, or access its files

Rootkits often work at lower levels than other malware, infiltrating the OS or hardware drivers

This makes them hard to detect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

DoS

A

Denial of service attack seeks to overload a service by flooding a server with malicious requests

A DoS attack comes from once source often

Most servers can cope with a DoS attack, and that computers can be blocked from making requests

41
Q

A DDoS

A

is where the serve is flooded by requests from multiple sources

42
Q

Botnets

A

A bot is a type of malware which enables the attacker to control the computer remotely without the owners knowledge

A botnet is a network of all of the individual bots which the attacker can control

The attacker can use the botnet to launch attacks, like phishing emails and disinformation campaigns on social media

43
Q

Botnet used with a DDoS attack how and the effects of it (2)

A

A botnet can be used to launch a DDoS attack

Is much harder to block and more likely to overload the server

44
Q

Environmental vulnerabilities

A

Weaknesses related to the surroundings of a computer system, including the effect of external natural disasters

45
Q

Copyright designs and patents Act

A
  • The act makes it illegal to copy a work without the owners permission

-The owner is the copyright holder

  • Making unauthorised copies of a work is also illegal
46
Q

Three common ways the CD&P is broken

A
  • Using software without the correct software licenses
  • Downloading files from internet websites
  • Copying music, DVDs, CDs and software.
47
Q

CMA ACT summary

A
  • The Act aims to protect data and information held on computer systems
  • The act does not stop hacking but makes it illegal to do this,
  • Hackers that charged can face a prison sentence, a fine or both
48
Q

Social engineering

A

The act of manipulating humans so that they give up private information or their money (exploiting them as the weak point in the system)

49
Q

pretexting

A

Using an invented scenario to trick the victim into giving up information

50
Q

How is pretexting done

A

Usually involves the attacker impersonating someone else who may be real or made up

51
Q

Phishing

A

Disguising yourself as a trust worthy person or organisation to obtain personal information from a victim

52
Q

How is phishing often done

A

Usually done over email, and many emails will often be blindly sent

53
Q

Baiting

A

Involves tempting someone with an offer which is hiding the true consequences

54
Q

Quid pro quo

A

The attacker will offer something, like a favor in exchange for access to some personal information.

55
Q

Tailgating/piggybacking

A

When people are authorized are followed by an attacker to gain access to a secure area

56
Q

How may pretexting be used for tailgating

A

Pretexting might be used to make the tailgaiting less suspicous, like having a fake lanyard or pretending to lose keys

57
Q

Shoulder surfing

A

Directly observing a person entering their private information, often by looking over their shoulder

58
Q

Pharming

A

Creates a fake website which impersonates a trusted one

Victims are tricked to enter their information, thinking the website is real

Sophisticated pharming attacks involve redirecting the victim from the legitimate website to the fake website

59
Q

Hacking

A

Accessing computer systems without using the normal means of access

60
Q

Black hat hackers

A

Where they hack into systems with malicious intent to steal, exploit and sell data. This is illegal and unethical

61
Q

White hat hackers

A

Where they are given permission by companies to hack into systems to identify vulnerabilities this is legal and ethical

62
Q

Grey hat hackers

A

Where they hack into systems for fun or to troll this may be illegal and or unethical, depending on how malicious the hacker is being

63
Q

Environmental vulnerabilities

A

Weaknesses related to the surroundings of a computer system, including the effect of external natural disasters

64
Q

Physical vulnerabilities

A

Weaknesses related to how the physical computer systems can be interacted with in real life

65
Q

System vulnerabilities

A

Weaknesses related to the running if a computer system

66
Q

System vulnerabilities e.gs

A

Weak passwords can be easily guessed by brute force attack

insecure modems
A modem converts data so that it can be sent over a network. A design flaw in the modem might allow an attacker to intercept all of the data

67
Q

Impacts of a cyber security attack

A

Impacts of cyber security attacks consider the immediate effects on individuals and organisations

68
Q

Data theft

A

When a attacker extracts private data in an attack this is data theft

69
Q

Identity theft

A

If the data is personal information, then it is considered identity theft

70
Q

Fraud

A

If the hacker uses personal information it is considered fraud

71
Q

Data destruction

A

If an attacker permanently deleted data, this is called data destruction

72
Q

Data manipulation

A

is when an attacker indirectly changes data to meet their needs

73
Q

Data modification

A

Is an attacker directly changes data to meet their needs

74
Q

3 Consequences of a cyber attack

A

Loss

Disruption

Safety

75
Q

Cyber attack consequences
Loss:

A

loss: Financial, data, reputation

Disruption: operational, financial, commercial

Safety: Individuals, equipment, finance

76
Q

Loss impact of a cyber attack

A

Having none or less of both tangible and intangible assets following an attack

77
Q

consequences of cyber attack

Financial loss

A

Money may be stolen in attack,

fines may be imposed

may cost money to recover from the attack

78
Q

Loss of data

A

Data is often the most important asset an organisation has. Data may be destroyed or manipulated/modified to a point which can’t be recovered

79
Q

Loss of reputation

A

An organisations reputation is how they are perceived by the public. Good reputations are hard to grow but easy to destroy

80
Q

Operational disruption

A

The delay of responding and recovering from a cyber security attack may affect day to day business

81
Q

Financial disruption

A

A loss of customers can mean businesses have to restructure their financial commitments

82
Q

Commercial disruption

A

Businesses may not be able to sell their product or service for a period of time

83
Q

Cyber attack safety section e.gs

A

A cyber attack could target critical national infrastructure. like healthcare or power plants

84
Q

Equipment after cyber attack

A

Critical equipment could fail life support machines

85
Q

Finance

A

Individuals and business may be unable to access their money, and so can no longer pay for essentials, like food and rent

86
Q

A physical prevention measure is what

A

Protects the surroundings of a computer system

87
Q

A physical prevention measure e.gs

A

fingerprint
facial scan
iris
voice recognition

88
Q

A logical prevention measure

A

Protects the running of the computer system

89
Q

logical prevention measures e.gs

A

2fa

getting an antivirus which updates regular to mitigate against that updates malware

90
Q

Access rights

A

Are given to user accounts to determine what they can access

91
Q

Encryption

A

Encryption doesn’t stop unauthorized users intercepting the data but it stops them understanding it. Only the intended recipient and you can understand it because you have the recipient have the key

92
Q

read

Back ups need to be kept as secure as the primary source and should be kept separate from each-other

A

read

Back ups need to be kept as secure as the primary source and should be kept separate from each-othe

93
Q

Factors when doing secondary research you need to consider

A

Their agenda or point of view this may cause bias

The time of it how recent it is

How accurate it is are u able to verify with a second source

94
Q

Characteristics of information

A

Validity, reliability, bias

95
Q

Validity

A

This refers to how believable the information is

96
Q

Reliability

A

This refers to if it can be verified and the source has a reputation for accurate information

97
Q

Bias

A

Information is biased when the source is only giving one perspective or letting their agenda influence the information

98
Q

Consequences of a cyber attack
Disruption (OFC/ of course)

A

Disruption: operational, financial, commercial

99
Q

Consequences of a cyber attack
Safety: (Fie)

A

Safety: finance,individuals, equipment