Section A Flashcards

1
Q

What is an internal threat

A

An internal threat refers to the risk of someone inside a company that could exploit a system to cause damage or steal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an external threat

A

An external threat refers to someone outside of a company that attempts to exploit system vulnerabilities such as hacking or social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Malware

A

Software that is designed to cause harm to your IT system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is spyware

A

This is a form of malware that gathers information after infecting a user and secretly sending it to third-party users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is ransomware

A

This prevents you from accessing your computer, it often encrypts the storage devices and demands a sum of money, in order to gain access back

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are rootkits

A

They are used to get unauthorised remote administrator access, they spread by hiding software by appearing to be legitimate, but can steal data or hide other malware within the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is commercial hacking

A

When Companies hack for the purpose of corporate espionage, finding out about their competitor plans, products and finances

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is government hacking

A

This when companies or governments hire white hat hackers to detect system vulnerabilities so that they can prevent black hat hackers from getting in the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is sabotage

A

Sabotage refers to the activity used to deliberately disrupt services this could include distributing malware and denial of service attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is social engineering

A

This refers to techniques that are used to deceive people to give their private and confidential information, this can be through the form of a phishing email.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is operational loss

A

This refers to a loss that damages the capability of an organisation, such as manufacturing output, service availability or service data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is financial loss

A

This refers to the loss where an organisation loss wealth, such as compensation, legal fees or increased costs due to the threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a system vulnerability

A

This refers to a weak point in the system which can be exploited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the data protection act?

A

This act was introduced in 1998 to protect the privacy of individuals by ensuring that their confidential is processed in an ethical manner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Who is responsible for investigating possible data protection violations ad what are the consequences

A

The information commissioners office is an independent body that is responsible for this, if an organization has been breaching any of these regulations they can be fined up to £500000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the general data protection regulations

A

This was enforced on 25th May 2018 in the EU member states, this replaced the DPA but most of it is similar

17
Q

LIST 3 POINTS OF THE DATA PROTECTION ACT

A
  • PERSONAL DATA SHOULD NOT BE KEPT FOR LONGER THAN IT’S NECESSARY PURPOSES
  • PERSONAL DATA SHOULD NOT BE TRANSFERRED TO A COUNTRY OR TERRITORY OUTSIDE THE EU WITHOUT ADDEQUATE PROTECTION
  • APPROPIATE TECHNICAL AND ORGANISATIONAL MEASURES SHOULD BE TAKEN TO PROTECT DATA
18
Q

WHAT IS THE COMPUTER MISUSE ACT

A

THIS LAW BROUGHT INTO FORCE TO PROTECT USERS AGASINT THEFT AND DAMAGE OF THE INFORMATION STORED ON THEIR IT SYSTEMS

19
Q

What is the telecommunications law(2000)?

A

This law allows businesses to monitor the activity on their network so that they can protect themselves from cyber threats.

20
Q

What were the 3 crimes that were covered by the computer misuse act?

A

Offence 1 - unauthorised access to computer material could result in 2 years of imprisonment
Offence 2 - unauthorised access with the intent to cause harm or damage, this can result in up to 5 years of imprisonment
Offence 3 - impairing the operation of a computer, this could include changing data, is punishable of 10 years imprisonment

21
Q

What rules do organisations need to comply with when monitoring employees on their network

A
  • To be ensured that legislations of the company are being followed
  • To ensure employees are fulfilling their duties
  • To prevent or detect crime
  • To secure and ensure the effective operation of the network