Threats facing digital marketing Flashcards
1
Q
What is the difference between commodity and bespoke attack?
A
Commodity: use of tools openly available, implemented by competent user. (Ex; software that scans for known vulnerabilities)
Bespoke: specifically designed for an attack domain for organised crime and states (Ex; Zero day vulnerability)
2
Q
How do attacks occur on firms?
A
- DDOS (distributed denial of service) attack, multiple systems are infected in order to target single system causing denial of service attack.
- Ransomware (common in NHS)
- Supply chain attack
3
Q
How are attacks imposed on users?
A
- Phishing: fake emails, install software, visit website through luring (Made by Botnet)
- Ransomware: malware downloaded (e-mail link)
- Speed Phishing: target specific individual (CEO)
- Browser hijacking: redirected from page you view
- Bogus participants: fake identities/business
- Fake site: contain malware or fraudulent
4
Q
How do attacks occur on the IoT?
A
- 2013/2014: DDOS attack which involve IoT devices include TVs and at least on fridge.
- security of devices has not been of main focus
- 25% of spam was sent from IoT devices
- simple attacks, based on default passwords
5
Q
How does the management of IoT devices make attacks more likely? (LIMUA)
A
- Locating devices where accessible to hackers
- Identical devices, means vulnerability can be exploited on a large scale
- Mass scale, Devices are deployed/connected
- upgrading them might not be available
- Awareness from users is lacking, of problems/Hijacking due to no obvious signs
6
Q
WHO carries out attacks on the web?
A
- Hacktivists: e.g. Bradley Manning, Edward Snowden. Insider/outsiders of the firm. Use Wikileaks to publish the case.
- Criminal organisations: firms are lucrative, they try to extort money, extract data, sell secrets.
- Careless and comprised employers and insiders. the dark web is a source of tools and marketplace for stolen details.
7
Q
What are some general solutions to cyber attacks? (COKS)
A
- Conscious care behaviour
- Organisational policies
- Knowledge sharing
- Security collaboration (reduces cost and improves performance)
8
Q
What are the percentages of financial fraud losses by type?
A
- Payment card (75%), 46% e-commerce
- Remote Banking (22%)
- Cheque (3%)
9
Q
How does attacks using data in transit work?
A
- Interception of data in transit “Man in the middle”
- Eavesdropping, theft of details (passwords)
- both internal and external
e. g. spoof wifi-networks, use of virtual private networks