Threats facing digital marketing Flashcards

1
Q

What is the difference between commodity and bespoke attack?

A

Commodity: use of tools openly available, implemented by competent user. (Ex; software that scans for known vulnerabilities)

Bespoke: specifically designed for an attack domain for organised crime and states (Ex; Zero day vulnerability)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How do attacks occur on firms?

A
  1. DDOS (distributed denial of service) attack, multiple systems are infected in order to target single system causing denial of service attack.
  2. Ransomware (common in NHS)
  3. Supply chain attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How are attacks imposed on users?

A
  1. Phishing: fake emails, install software, visit website through luring (Made by Botnet)
  2. Ransomware: malware downloaded (e-mail link)
  3. Speed Phishing: target specific individual (CEO)
  4. Browser hijacking: redirected from page you view
  5. Bogus participants: fake identities/business
  6. Fake site: contain malware or fraudulent
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How do attacks occur on the IoT?

A
  • 2013/2014: DDOS attack which involve IoT devices include TVs and at least on fridge.
  • security of devices has not been of main focus
  • 25% of spam was sent from IoT devices
  • simple attacks, based on default passwords
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does the management of IoT devices make attacks more likely? (LIMUA)

A
  1. Locating devices where accessible to hackers
  2. Identical devices, means vulnerability can be exploited on a large scale
  3. Mass scale, Devices are deployed/connected
  4. upgrading them might not be available
  5. Awareness from users is lacking, of problems/Hijacking due to no obvious signs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

WHO carries out attacks on the web?

A
  1. Hacktivists: e.g. Bradley Manning, Edward Snowden. Insider/outsiders of the firm. Use Wikileaks to publish the case.
  2. Criminal organisations: firms are lucrative, they try to extort money, extract data, sell secrets.
  3. Careless and comprised employers and insiders. the dark web is a source of tools and marketplace for stolen details.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are some general solutions to cyber attacks? (COKS)

A
  1. Conscious care behaviour
  2. Organisational policies
  3. Knowledge sharing
  4. Security collaboration (reduces cost and improves performance)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the percentages of financial fraud losses by type?

A
  1. Payment card (75%), 46% e-commerce
  2. Remote Banking (22%)
  3. Cheque (3%)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does attacks using data in transit work?

A
  1. Interception of data in transit “Man in the middle”
  2. Eavesdropping, theft of details (passwords)
  3. both internal and external
    e. g. spoof wifi-networks, use of virtual private networks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly