Module H Flashcards
This is the practice of protecting computer systems, networks, and programs from digital attacks, damage, or unauthorized access.
Cybersecurity
It involves implementing measures, protocols, and technologies to ensure the?
- Confidentiality
- Integrity
- Availability
What is the CIA Triad of Information Security?
- Confidentiality
- Integrity
- Availability
What are the Categories of Cybercrime?
- Computer as the Target
- Computer as the Weapon
Computer is used to attack another computer. E.g. hacking, viruses, worms, DoS attacks
Computer as the Target
Computer is used to commit real-world crime. E.g. credit card fraud
Computer as the Weapon
This refers to the unauthorized access, manipulation, or exploitation of computer systems, networks, or data usually in a large organization such as the government.
Hacking
Ethical hacking where individuals use their skills to find and fix security vulnerabilities
White Hat Hacking
A darker side of hacking, involving individuals or groups who exploit vulnerabilities for malicious purposes.
Black Hat Hacking
This is a digital version of fishing where cybercriminals are attempting to lure people into revealing sensitive information, such as passwords or credit card numbers.
Phishing
This can be done through deceptive emails or messages.
Phishing
Short for ‘voice phishing,’ which involves defrauding people over the phone, enticing them to divulge sensitive information.
Vhishing
This uses fake mobile text messages to trick people
Smishing
The attacker lures the recipient into clicking on a link or attachment leading them to a fraudulent site that captures their sensitive information.
Phishing
The attacker attempts to grab the victims’ data and use it to their own benefit - typically, to gain financial advantage
Vhishing
This attack is a digital traffic jam that disrupts the normal functioning of a computer system, network, or website.
Denial of Service (DoS)
The perpetrator overwhelms the target with a flood of traffic, making it unable to respond to legitimate requests.
Denial of Service (DoS)
These are unsolicited and often irrelevant messages sent in bulk to a large number of recipients.
Spam Email
This is a broad term that encompasses various types of harmful software designed to disrupt, damage, or gain unauthorized access to computer systems, usually for financial gains.
Malwares or Malicious software
These attach themselves to clean files and spread when the infected file is executed.
Viruses
Self-replicating and capable of spreading across networks without human intervention.
Worms