LU8 - Social Implications Flashcards
Acceptable User Policy (AUP)
A set of rules, drawn up by management
Social Engineering
Act of manipulating people into doing something
Such as computer fraud, gaining unauthorised access to computer
Shoulder Surfing
Attacker uses observational techniques, to get info that user is inputting
Dumpster Diving
Information can be gathered from organisations trash and be used against company
Phishing
User/company is lured into thinking link or message is from someone they know - which could be malware and lead to being hacked
Sabotage
After gaining access to the system, attacker will corrupt the system
Marketting
The attacker will make it seem as if only they independently can fix the issue
Support
Attacker gains your trust and therefor obtains access to sensitive information
White hat Hacker
Are non-malicious Hackers
Black hat Hackers
Are malicious hackers
Grey Hat Hackers
May sometimes act illegally, but have good intentions
Virus Writers
They write computer programs that spread from one computer to the next
Effect of Cyber-Crimes
Can have a major financial impacts on a company
Safeguards Against Computer Crimes
- Install antimalware/antivirus/firewall
- Surf and download safely, websites
- you trust
- NEVER click agree or OK to a pop-up
- update software regurarly