Unit 3 Key Words Flashcards
Digital System
Based on discontinuous data/events
Confidentiality
Restricting access to authed ppl only
Integrity
Assuring accuracy and trustworthiness of data
Availability
Assuring data is available when required
Cyber Security
Technologies, processes and practices used to protect networks, programs and computers.
Escalation of privileges
Obtaining rights users don’t normally have
Vertical escalation
Finding flaws in security system or OS to increase level of access
Horizontal escalation
Stealing password or gaining access due to program fault
Information disclosure
Info passed on without permission
Account lockout
Login blocked due to failed attempts
Denial of Service
Attack that shuts down a comp/network by flooding it with traffic
System attack examples
DoS, botnet, social engineering
Physical attack examples
Theft
Environmental examples
Floods, fire, earthquakes
Cyber-enabled Crime
Fraud, theft and bullying using IT
Cyber-dependent Crime
Can only be carried out using a computer, i.e DoS
State-sponsored
Countries spying on each other
Hacktivist
Politically and socially motivated disruptive hackers
Cyber Criminal
Using computers to perform malicious activities, for financial gain generally
Insider
Hacker from within the target organisation
Script Kiddie
Hacker that has no programming knowledge and uses existing scripts
Vulnerability Broker
Finds bugs in systems and sells them