LO4 Flashcards
Cyber security
Consists of the processes, practices and technologies designed to protect networks computers, programs and data from attack damage or unauthorised access.
An asset
An asset is any device, data, or perception that has value to an organisation
The goal of cyber security
to protect assets
Give one tangible asset and one intangible asset
A server is tangible
Reputation is intangible
A cyber attack seeks to what
Damage, steal or destroy an asset.
What does a threat have potential for
To harm an asset
What is a vunerability
A vulnerability is a weakness in an asset or prevention measure which can be exploited in an attack
If we have no vulnerabilities do we have any threats
no but this is unrealistic
Prevention measures
A prevention measure aims to reduce the risk of an asset being exploited in an attack
Does the prevention measure destroy a threat
The threat will still exist but the prevention measure may prevent it from ever happening
Mitigation of risks meaning what
is reducing the risk of an attack happening or reducing its impact if it does
What should you do with data once its purpose has run its course
Have it be securely destroyed
securely destroyed data definition
The data cannot be retrieved
How does a magnetic wipe destroy data
It destroys thew magnetic patterns which store the data, making them random and unreadable.
Overwriting advantage + what it is
Allows the device to keep working as normal.
It involves replacing the data which is to be destroyed with random data instead.
Morality
Morality generally refers to our personal view
Ethics
Ethics generally come from a group or wider society
Legalisation
Some immoral or unethical actions are punishable by law, some are not.
Defamation of character
Someone says something untrue about you which causes serious damage to your reputation, it may be both immoral and unethical, and also illegal.
What law is designed to protect intellectual property (IP) from being stolen
Copyrights, designs and patents Act of (1988)
Copyrights, designs and patents Act of (1988)
What law is designed to protect intellectual property (IP) from being stolen
Computer misuse act (1990)
Unauthorised access to a computer is illegal and can be punished
It can punish and creating malware. Law
Computer misuse act (1990)
What makes it illegal to access computer systems without permission
The CMA
Health and safety at Work Act (1974)
Ensure employers make the work safe for employees
Designed to protect personal data from misuse. Law
Data protection act
Data protection act described
Designed to protect personal data from misuse. Law
What could the DPA help us with
Especially sensitive data includes data related to bio metrics, health, political or religious beliefs
4 principles the DPA implores
- Be fairly and lawfully processed
- Be processed for limited purposes
- Be adequate, relevant and not excessive
- Be accurate and up-to-date.
- Not be kept longer than is necessary
-Be processed in line with your rights
- Be kept secure
- Not be transferred to other countries outside of the European economic area that do not have adequate data protection
When collecting information especially from a secondary research method you need to consider what factors
Who or what the source is
Their agenda or point of view
- which could cause bias
The timeliness and how recent it is
How accurate is it
- can I verify with a second source
Difference between validity and reliability
Validity is how believable the information is.
Reliability refers to if it can be verified and/or the source has a reputation for accurate information
A virus works how (3)
is a type of malware which inserts itself into other computer programs
When the host program is run, the virus code executes too
When this happens, the virus will replicate itself and spread
What do you call something that does not require a host program
Stand alone
Worms work how (3)
Is stand alone
Replicate very quickly
Network worms are the most common, which spread over networks and slow them down
Trojan horse (4)
A Trojan horse is malware which is disguised as a useful program but actually contains malicious code
It make take months for a Trojan horse code to start to act maliciously
Most trojans can’t self-replicate
A trojan horse may provide a backdoor
Spyware (1)
Collects information about you without your knowledge
Adware (2)
Shows lots of advertisements to the user making the developer money, a lot of popups
Are not usually malicous
Ransomware (3)
A ransom money is demanded for the release of something
Ransomware threatens to block access to files or release personal information unless a sum of money is paid
Often access is blocked by encrypting the files, and the ransoms are often demanded in a cryptocurrency
Rootkits
are usually a collection of malware
A rootkit can be used by an attacker as a backdoor to remotely control a computer, or access its files
Rootkits often work at lower levels than other malware, infiltrating the OS or hardware drivers
This makes them hard to detect