Systems Security (Ch14) (M1) Flashcards
Give two risks of computer networks
-Username/passwords can be cracked or stolen
-Viruses/malware can be spread to devices, computer systems and other systems you interact with physically and digitally
-Data can be accessed, changed or stolen
-Email scams can be used to trick people, for purposes such as identity theft
Define a cyber attack
A cyber-attack is an attempt to gain unauthorised access to a network with the intention of accessing, changing, or destroying information.
What are people who perform cyber attacks often called?
Individuals who perform cyber attacks are often referred to as hackers or cybercriminals
Give four reasons for cyber attacks
1) For a challenge – to see if they can succeed
2) For fun – it might be a hobby
3) For financial gain – stealing and selling data
4) Idealism – trying to expose an injustice
5) Revenge – a disgruntled employee or ex friend
6) To take out a competitor – by bringing down their website
7) Political motives – to raise awareness of a political issue
8) Security reasons – trying to find flaws in a system, before someone else finds them
Define cyber security
Cyber security is the set of measures taken to protect networks and computer systems from cyber-attacks.
Name five things a business might do, to improve their cyber security
Things a business might do, to improve their cyber security:
1) Get a VPN
2) Install reliable Antivirus software
3) Use complex passwords
4) Use password managers
5) Protect with a firewall
6) Install encryption software
7) Ignore suspicious emails
8) Limit access to critical data
9) Back up data often
10) Secure your Wi-Fi Network
11) Secure laptops and smartphones
12) Communicate cyber security measures to employees
Why might cyber criminals target businesses?
Cyber criminals may target businesses because:
-Businesses have a lot of money, they may want to gain some for themselves
-They may disagree with what the business does
-It may be an old employee from a business, trying to get revenge
What is the most valuable thing that a business owns? Why?
The most valuable thing that a business owns is data.
Physical things can all be replaced. But if data is lost, the organisation would no longer have a business.
Why do cyber attacks often focus on trying to steal company data?
Cyber-attacks often focus on trying to steal company data because:
-The criminals can sell this valuable data to a competitor.
-Or, they might try to extort (blackmail) money, for the safe return of the data.
-It could also be to damage the reputation of a business, showing people that the business doesn’t take enough precautions to keep user’s confidential data safe
Give two consequences to a business, following a data breach
Consequences to a business, following a data breach:
-They lose important information about employees, like allergies, phone numbers
-Personal information about everyone who works at the company would be accessed by a third party
-The business could be sued for weak cyber security
-The business is breaching the Data Protection Act (2018) by not keeping employee data safe
Give one example of personal data that may be stored by a business
Much of the data stored by businesses is classed as personal data. For example: customer names, addresses, bank details, etc
What condition do businesses have to follow, if they are storing customer data?
Businesses are allowed to store customer data, as long as they have adequate security measures in place, following the Data Protection Act (2018) / GDPR
Why would a business face a fine and be prosecuted if data is stolen in a cyber attack?
If data is stolen during a cyber-attack, it shows that the business did not do enough to protect that data.
They have broken the law and are likely to be prosecuted and face a very large fine.
What is confidentiality?
Confidentiality is where data is kept private from users and third parties.
Why is confidentiality important for companies?
Confidentiality is where data is kept private from users and third parties.
This is incredibly important because companies can be prosecuted for not following the Data Protection Act if there is a data breach or leak of data.
It would also damage their reputation and many people would not trust the company to store their personal data.
Give four forms of attack on a network
Forms of Attack:
Malware
Phishing
Brute Force Attacks
Denial of Service Attacks
Data Interception and Theft of Data
SQL Injection
Rootkit
Backdoors
What are the three types of attack?
Three types of Attack:
Passive attack
Active attack
Insider attack
What is a passive attack? What is used?
A passive attack is where someone monitors data travelling on a network and intercepts any sensitive information they find.
They use network monitoring hardware and software, such as packet sniffers. Passive attacks are hard to detect as the hacker is quietly listening.
Encryption is the best way to be protected from passive attacks.
What is an active attack? What is the main defence?
An active attack is where someone attacks a network with malware or other planned attacks. They are more easily detected. The main defence is a firewall.
What is an insider attack?
An insider attack is where someone within an organisation exploits their network access to steal information.
What is malware?
Malware is software designed to disrupt, damage or gain unauthorised access to a computer system.
Malware is short for ‘malicious software’
Give three different forms of malware
Different forms of malware:
Viruses
Worms
Trojans
Spyware and Keyloggers
Ransomware
Give three things that malware can typically do to a computer system
Typical things Malware can do:
-Delete or modify files
-Scareware - for example, telling the user their computer is infected with lots of viruses to scare them into following malicious links or paying or problems to be fixed
-Ransomware - encrypting all files on a computer. The user recieves a message demanding a large sum of money in exchange for the decryption key.
-Spyware - secretly monitoring a user’s actions., For example: key presses, and it sends this information to the hacker.
-Rootkits - these alter permissions, giving malware hackers administrator-level access to devices.
-Backdoors - holes in someone’s security which can be used for future attacks.
Give two ways that malware can access a device
Ways Malware can access a device:
-Viruses attach - by copying themselves - to certain files. Users spread them by copying infected files, and activate them by opening infected files.
-Worms are like viruses but they self-replicate, this means that they can spread very quickly. Worms exploit weaknesses in network security.
-Trojans are malware disguised as legitimate software. They don’t replicate themselves - users install them, not realising they have a hidden purpose.