Section A Flashcards
What is an internal threat
An internal threat refers to the risk of someone inside a company that could exploit a system to cause damage or steal data
What is an external threat
An external threat refers to someone outside of a company that attempts to exploit system vulnerabilities such as hacking or social engineering
What is Malware
Software that is designed to cause harm to your IT system
What is spyware
This is a form of malware that gathers information after infecting a user and secretly sending it to third-party users
What is ransomware
This prevents you from accessing your computer, it often encrypts the storage devices and demands a sum of money, in order to gain access back
What are rootkits
They are used to get unauthorised remote administrator access, they spread by hiding software by appearing to be legitimate, but can steal data or hide other malware within the system
What is commercial hacking
When Companies hack for the purpose of corporate espionage, finding out about their competitor plans, products and finances
What is government hacking
This when companies or governments hire white hat hackers to detect system vulnerabilities so that they can prevent black hat hackers from getting in the system
What is sabotage
Sabotage refers to the activity used to deliberately disrupt services this could include distributing malware and denial of service attacks
What is social engineering
This refers to techniques that are used to deceive people to give their private and confidential information, this can be through the form of a phishing email.
What is operational loss
This refers to a loss that damages the capability of an organisation, such as manufacturing output, service availability or service data
What is financial loss
This refers to the loss where an organisation loss wealth, such as compensation, legal fees or increased costs due to the threat
What is a system vulnerability
This refers to a weak point in the system which can be exploited
What is the data protection act?
This act was introduced in 1998 to protect the privacy of individuals by ensuring that their confidential is processed in an ethical manner
Who is responsible for investigating possible data protection violations ad what are the consequences
The information commissioners office is an independent body that is responsible for this, if an organization has been breaching any of these regulations they can be fined up to £500000