Systems Security (Ch14) (M1) Flashcards
Give two risks of computer networks
-Username/passwords can be cracked or stolen
-Viruses/malware can be spread to devices, computer systems and other systems you interact with physically and digitally
-Data can be accessed, changed or stolen
-Email scams can be used to trick people, for purposes such as identity theft
Define a cyber attack
A cyber-attack is an attempt to gain unauthorised access to a network with the intention of accessing, changing, or destroying information.
What are people who perform cyber attacks often called?
Individuals who perform cyber attacks are often referred to as hackers or cybercriminals
Give four reasons for cyber attacks
1) For a challenge – to see if they can succeed
2) For fun – it might be a hobby
3) For financial gain – stealing and selling data
4) Idealism – trying to expose an injustice
5) Revenge – a disgruntled employee or ex friend
6) To take out a competitor – by bringing down their website
7) Political motives – to raise awareness of a political issue
8) Security reasons – trying to find flaws in a system, before someone else finds them
Define cyber security
Cyber security is the set of measures taken to protect networks and computer systems from cyber-attacks.
Name five things a business might do, to improve their cyber security
Things a business might do, to improve their cyber security:
1) Get a VPN
2) Install reliable Antivirus software
3) Use complex passwords
4) Use password managers
5) Protect with a firewall
6) Install encryption software
7) Ignore suspicious emails
8) Limit access to critical data
9) Back up data often
10) Secure your Wi-Fi Network
11) Secure laptops and smartphones
12) Communicate cyber security measures to employees
Why might cyber criminals target businesses?
Cyber criminals may target businesses because:
-Businesses have a lot of money, they may want to gain some for themselves
-They may disagree with what the business does
-It may be an old employee from a business, trying to get revenge
What is the most valuable thing that a business owns? Why?
The most valuable thing that a business owns is data.
Physical things can all be replaced. But if data is lost, the organisation would no longer have a business.
Why do cyber attacks often focus on trying to steal company data?
Cyber-attacks often focus on trying to steal company data because:
-The criminals can sell this valuable data to a competitor.
-Or, they might try to extort (blackmail) money, for the safe return of the data.
-It could also be to damage the reputation of a business, showing people that the business doesn’t take enough precautions to keep user’s confidential data safe
Give two consequences to a business, following a data breach
Consequences to a business, following a data breach:
-They lose important information about employees, like allergies, phone numbers
-Personal information about everyone who works at the company would be accessed by a third party
-The business could be sued for weak cyber security
-The business is breaching the Data Protection Act (2018) by not keeping employee data safe
Give one example of personal data that may be stored by a business
Much of the data stored by businesses is classed as personal data. For example: customer names, addresses, bank details, etc
What condition do businesses have to follow, if they are storing customer data?
Businesses are allowed to store customer data, as long as they have adequate security measures in place, following the Data Protection Act (2018) / GDPR
Why would a business face a fine and be prosecuted if data is stolen in a cyber attack?
If data is stolen during a cyber-attack, it shows that the business did not do enough to protect that data.
They have broken the law and are likely to be prosecuted and face a very large fine.
What is confidentiality?
Confidentiality is where data is kept private from users and third parties.
Why is confidentiality important for companies?
Confidentiality is where data is kept private from users and third parties.
This is incredibly important because companies can be prosecuted for not following the Data Protection Act if there is a data breach or leak of data.
It would also damage their reputation and many people would not trust the company to store their personal data.
Give four forms of attack on a network
Forms of Attack:
Malware
Phishing
Brute Force Attacks
Denial of Service Attacks
Data Interception and Theft of Data
SQL Injection
Rootkit
Backdoors
What are the three types of attack?
Three types of Attack:
Passive attack
Active attack
Insider attack
What is a passive attack? What is used?
A passive attack is where someone monitors data travelling on a network and intercepts any sensitive information they find.
They use network monitoring hardware and software, such as packet sniffers. Passive attacks are hard to detect as the hacker is quietly listening.
Encryption is the best way to be protected from passive attacks.
What is an active attack? What is the main defence?
An active attack is where someone attacks a network with malware or other planned attacks. They are more easily detected. The main defence is a firewall.
What is an insider attack?
An insider attack is where someone within an organisation exploits their network access to steal information.
What is malware?
Malware is software designed to disrupt, damage or gain unauthorised access to a computer system.
Malware is short for ‘malicious software’
Give three different forms of malware
Different forms of malware:
Viruses
Worms
Trojans
Spyware and Keyloggers
Ransomware
Give three things that malware can typically do to a computer system
Typical things Malware can do:
-Delete or modify files
-Scareware - for example, telling the user their computer is infected with lots of viruses to scare them into following malicious links or paying or problems to be fixed
-Ransomware - encrypting all files on a computer. The user recieves a message demanding a large sum of money in exchange for the decryption key.
-Spyware - secretly monitoring a user’s actions., For example: key presses, and it sends this information to the hacker.
-Rootkits - these alter permissions, giving malware hackers administrator-level access to devices.
-Backdoors - holes in someone’s security which can be used for future attacks.
Give two ways that malware can access a device
Ways Malware can access a device:
-Viruses attach - by copying themselves - to certain files. Users spread them by copying infected files, and activate them by opening infected files.
-Worms are like viruses but they self-replicate, this means that they can spread very quickly. Worms exploit weaknesses in network security.
-Trojans are malware disguised as legitimate software. They don’t replicate themselves - users install them, not realising they have a hidden purpose.
What is a virus?
A computer virus is a piece of code designed to copy itself (replicate) into other programs and files.
Once a program infected with a virus has been opened, what will happen?
Once an infected program has been opened, the virus will be placed into system memory.
It will then begin to replicate, trying to infect other files and network devices.
What will many viruses attempt to do to a computer?
Many viruses will attempt to corrupt, modify or delete data on your computer.
Give three ways that viruses can be spread
Viruses can be spread in a number of different ways:
-Email - via attachments in email messages
-Infected websites
-Removable media - e.g. memory sticks
-Social media - links or images in posts
What is a worm?
A worm is also a malware program that tries to replicate itself.
In terms of being run and activated, what is the difference between a virus and a worm?
Viruses are normally attached to an executable (.exe) file and need that file to be run, before they are activated.
But, worms do not need a host program to run and replicate.
Once a worm is on a system, what will it do?
Once a worm is on your system, it will continue to make copies and spread around the network, regardless of what your computer is doing.
Give one effect of a worm
Effects of a worm:
-Worms are so effective at copying themselves that they can cause the system to run out of memory and crash.
-They can also slow down network connections as they search for other devices to infect.
Give two ways that worms can be spread
Worms can be spread in a number of ways:
-Files sent as email attachments
-Peer-to-peer file sharing networks
-Links to a resource on the internet
What is a trojan?
Trojan malware is malware that hides inside a legitimate software application.
Do trojans replicate? What is their aim?
Trojans do not replicate themselves. Their aim is to sit on your computer system, completely unnoticed.
What can trojans create on your system? What does this allow?
Trojans can create backdoors by making changes to your security, allowing other malware or hackers access to your system.
What kind of malware can a trojan act as? How does it behave like this?
Trojans can act as spyware, waiting to collect your online account and credit card details. Once collected, they are sent back to a criminal entity.
What network can a trojan make your computer part of? What attack is this used in?
Trojans can make your computer into part of a botnet to be used in a DDoS attack.
What is spyware?
Spyware is malware that gathers data about your activities on the computer.
It then relays that information (secretly) to a third party.
Give three things that spyware may gather about a user
Spyware may gather data such as:
-Websites that you visit
-Social media that you use
-Your personal information, e.g. login details, credit card data
-It may redirect your browser to advertising site or sites containing other malware
-It can also alter your browser settings such as changing your default home page
Give two ways you can download spyware
You may download spyware by:
-Clicking on a pop-up advert, e.g. ‘free prize draw’
-Downloading free software, e.g. a video sharing program
-Emails and social media messages can contain links to spyware