The Dark Side of the Digital Revolution Flashcards
Define hacker
Someone who carries out a cyberattack
Define cyber attack
When there is an unauthorised system/network access by a third party.
Define cyberterrorism
Unlawful attacks and threats of attacks against computers, networks, and the information stored to intimidate or coerce a government or its people.
What are the three types of cyberterror?
-Simple unstrucutured
-Advanced strucutured
-Complex coordinanted
What are simple structured attacks?
Basic hacks against individual systems
What are advanced strucutred attacks?
More sophisticated attacks against multiple systems or networks.
What are complex-coordinated attacks?
A coordinated attack capable of causing mass disruption against integrated defences.
What are some of the most common cyber attacks?
-Malware
-Phishing
-Man in the middle
-Denial of service
-Watering hole
What is a malware attack?
-Maliscious software viruses, including worms, spyware, ransomware, adware, and trojans.
What does ransomware do?
Blocks access to the networks key components.
What is spyware?
A software that steals all your confidential data.
What is adware?
Software that displays advertising content on a users screen
What is a phishing attack?
Where an attacker impersonates a trusted contact and sends the victim fake mail. Attackers can then gain access to confidential information and credentials.
What is a man-in-the-middle attack?
Known as an eavesdropping attack, an attacker comes in between a two-party communication, and by doing so, hackers steal and manipulate data.
What is a denial-of-service attack?
A significant threat to companies, attackers target systems, services, or networks and flood them with traffic to exhaust their resources, making their website hosts shut down, leaving legitimate service requests unattended.
What are the three types of hackers?
-Black hat hackers
-White hat hackers
-Grey hat hackers
What are black hat hackers?
Cybercriminals that illegally hack systems with malicious intent
What are white hat hackers?
Ethical security hackers who identify and fix vulnerabilities
What are grey hat hackers?
Don’t have criminal or malicious intent, but also don’t have the consent of those whose systems they hack into.
What is a watering hole attack?
The victim is a particular group of organisations; the attacker targets websites that are frequently used by the targeted group; the hacker infects these websites with malware infecting the victims systems and targets users personal information.
Fake news and Social Media
-SM is an environment where everyone can publish contents without editorial oversight.
-Users are exposed to information that is consistent with their views of the world.
-Misinformation in these environments thirves.
Examples of misinformation and social media
-100m Facebook users have been exposed to some kind of misinformation about vaccines
-Political misinformation in 2016 is thought to have had an impact on the US elections and Brexit outcomes.
What is impacted by misinformation?
-Political decisions
-Health-related decisions
-Confusion/doubts of previsou knowledge
-Consumer backlash
-Gaslighting
Define digital addiction
A harmful dependency on digital media and high-tech devices
What do psychologists believe about digital addiction?
That’s similar to substance addictions
What have studies found correlations between about digital addiction?
There is a strong correlation between the use of digital media and other disorders like depression and anxiety.