Section A Flashcards
What is an internal threat
An internal threat refers to the risk of someone inside a company that could exploit a system to cause damage or steal data
What is an external threat
An external threat refers to someone outside of a company that attempts to exploit system vulnerabilities such as hacking or social engineering
What is Malware
Software that is designed to cause harm to your IT system
What is spyware
This is a form of malware that gathers information after infecting a user and secretly sending it to third-party users
What is ransomware
This prevents you from accessing your computer, it often encrypts the storage devices and demands a sum of money, in order to gain access back
What are rootkits
They are used to get unauthorised remote administrator access, they spread by hiding software by appearing to be legitimate, but can steal data or hide other malware within the system
What is commercial hacking
When Companies hack for the purpose of corporate espionage, finding out about their competitor plans, products and finances
What is government hacking
This when companies or governments hire white hat hackers to detect system vulnerabilities so that they can prevent black hat hackers from getting in the system
What is sabotage
Sabotage refers to the activity used to deliberately disrupt services this could include distributing malware and denial of service attacks
What is social engineering
This refers to techniques that are used to deceive people to give their private and confidential information, this can be through the form of a phishing email.
What is operational loss
This refers to a loss that damages the capability of an organisation, such as manufacturing output, service availability or service data
What is financial loss
This refers to the loss where an organisation loss wealth, such as compensation, legal fees or increased costs due to the threat
What is a system vulnerability
This refers to a weak point in the system which can be exploited
What is the data protection act?
This act was introduced in 1998 to protect the privacy of individuals by ensuring that their confidential is processed in an ethical manner
Who is responsible for investigating possible data protection violations ad what are the consequences
The information commissioners office is an independent body that is responsible for this, if an organization has been breaching any of these regulations they can be fined up to £500000
What is the general data protection regulations
This was enforced on 25th May 2018 in the EU member states, this replaced the DPA but most of it is similar
LIST 3 POINTS OF THE DATA PROTECTION ACT
- PERSONAL DATA SHOULD NOT BE KEPT FOR LONGER THAN IT’S NECESSARY PURPOSES
- PERSONAL DATA SHOULD NOT BE TRANSFERRED TO A COUNTRY OR TERRITORY OUTSIDE THE EU WITHOUT ADDEQUATE PROTECTION
- APPROPIATE TECHNICAL AND ORGANISATIONAL MEASURES SHOULD BE TAKEN TO PROTECT DATA
WHAT IS THE COMPUTER MISUSE ACT
THIS LAW BROUGHT INTO FORCE TO PROTECT USERS AGASINT THEFT AND DAMAGE OF THE INFORMATION STORED ON THEIR IT SYSTEMS
What is the telecommunications law(2000)?
This law allows businesses to monitor the activity on their network so that they can protect themselves from cyber threats.
What were the 3 crimes that were covered by the computer misuse act?
Offence 1 - unauthorised access to computer material could result in 2 years of imprisonment
Offence 2 - unauthorised access with the intent to cause harm or damage, this can result in up to 5 years of imprisonment
Offence 3 - impairing the operation of a computer, this could include changing data, is punishable of 10 years imprisonment
What rules do organisations need to comply with when monitoring employees on their network
- To be ensured that legislations of the company are being followed
- To ensure employees are fulfilling their duties
- To prevent or detect crime
- To secure and ensure the effective operation of the network
What is a network vulnerability
They are a major source of attacks on a business’s attacks, an example of this are firewall ports
GIVE 3 EXAMPLES OF ORGANISATIONAL VULNERABILITIES
- FILE PERMISSIONS AND PRIVILIGES ASSIGNED TO EMPLOYEES COULD LEAVE THEM OPEN TO MANY THREATS
- THE PASSWORD POLICY
- IF AN ORGANISATION GIVES STAFF FULL PERMISSION AND PRIVILIGES THEN ANYONE WITH THE EMPLOYEES LOGIN CAN CAUSE DAMAGE TO THE SYSTEM
GIVE 2 EXAMPLES OF SOFTWARE VULNERABILITIES
- DOWNLOADED SOFTWARE THAT CAN COME FROM WEBSITES CAN BE UNTRUSTWORTHY AS THEY CAN HAVE MALWARE
- ILLEGAL COPIES CAN ALSO HAVE MALWARE AND ALSO ILLEGAL COPIES DON’T HAVE UPDATES WHICH LEAVES YOUR SYSTEM VULNERABLE
WHAT ARE OPERATING SYSTEM VULNERABILITIES CAUSED BY
THEY CAN CONTAIN CODING VULNERABILITIES WHICH CAN BE EXPLOITED BY HACKERS, IF YOUR OPERATING SYSTEM IS UNSUPPORTED OR ISN’T REGULARLY UPDATES IT CAN BE OPEN TO MALICIOUS USERS