Malicious attacks ,Threats and vulnerabilities Flashcards
What is a botnet
A botnet is a bunch of Internet-connected computers under the control of a remote hacker.
where can attacks happen?
Malicious attacks can occur in any of the seven domains of an IT infrastructure. Typically, malicious attacks are targeted on the User, Workstation, LAN, and LAN-to-WAN domains.
what are you trying to protect
customer data
Name ,address ,phone,NI ,number,dob ,card holder ,data
IT and network infastructure
Hardware ,software and services
intellectual property
Sensitive or secretive data such as patents, source code, formulas, engineering plans or designs.
what are your trying to protect?
Finances and financial dataBank accounts, credit card data, and financial transaction data.
Service availability and productivityThe ability of computing services and software to support productivity for humans and machinery
ReputationCorporate compliance and brand image
should companies report a data breach
It is part of your incident response plan is to report your data breach to the required regulatory authorities
-you may be legally required to
should companies report a data breach(downsides)
downside of disclosing a data breach:
-The company suffers public embarrassment criticism
-security practises will be scrutinised
-fine
should companies report a data breach (benefits)
company shows commitment to honesty and transparency
Reassurance: You can clearly communicate the remediation and prevention of further harm.
Save companies money
hackers
hacker often describes someone who breaks into a computer system without authorization.
In most cases that means the hacker tries to take control of a remote computer through a network or by software cracking.
types of hackers
Black-hat hackers
white-hat hackers
grey hat hackers
black hat hackers
Tries to break IT security and gain access to systems with no authorization in order to prove technical prowess.
White -hat hackers
White-hat hacker: Also called an ethical hacker, is an information systems security professional who has authorization to identify vulnerabilities and perform penetration testing
grey-hat hackers
: A hacker who will identify but not exploit discovered vulnerabilities, yet may still expect a reward for not disclosing the vulnerability openly.
what is a security breach
Any event that results in a violation of any of the C-I-A security tenets
-Some security breaches disrupt system services on purpose
-Some are accidental and may result from hardware or software failures
Activities that reach a security breach
denial service of attack
distributed denial service of attack
unacceptable web browsing behaviour
wiretapping
accidental data modifications
Denial service of attack
A coordinated attempt to deny service by occupying a computer to perform large amounts of unnecessary tasks