Week 10 Flashcards
What are the three steps to analyse a threat environment and act
Plan, Protect and Respond
Describe the planning principles plan if one is in a threat environment in ICT
Planning Principles:
Risk Analysis
Comprehensive
Security
Defence in depth
Minimum Permissions
Describe how companies can protect themselves if they are in a threat enviornment in ICT
Access Control
Firewalls
Cryptography
Define malware
– A general name for evil software
– software intentionally designed to cause damage
Describe vulnerabilities
Vulnerabilities are security flaws in specific programs.
Whats the difference between vulnerability specific malware and universal malware
Vulnerability-specific malware requires a specific vulnerability to be effective.
Universal malware does not require a specific vulnerability to be effective
Describe and define riskware
Riskware is software that is potentially
dangerous.
Usually offers some benefit at a “cost”
– Compromises security
– Acts illegally
Riskware might
– Block another application
– Be used as a backdoor for other malware.
Define social engineering attacks
Tricking the victim into doing something against his or her interests
Define fraud attacks
Lying to the user to get the user to do something against his or her financial self-interest.
Define Phishing attacks
Sophisticated social engineering attacks
with authentic-looking e-mail or Website.
Why is SMS not as popular for spam or phishing?
Because it costs more
Define credit card theft online?
Credit Card Number Theft
– Performed by “carders”
– Make purchases with stolen credit card or steal from online account
Define identity theft online
– Collecting enough data to impersonate the victim in large financial transactions
– May take a long time to restore the victim’s credit rating
Define vandalism
Vandalism/Sabotage:
– Deliberate damage to hardware, software and/or data, including companies’ websites
Why are disgruntled employees and en-employees dangerous
– Extensive access to systems, with privileges
– Knowledge about how systems work
– Knowledge about how to avoid detection
Business need to immediately withdraw network access if they dispense with the
services of an employee.
What are common deliberate indvidual sabotage methods
Logic Bomb– Destructive computer program that activates at a
certain time or in reaction to a specific event
Back door – Section of program code that allows a user to circumvent security procedures and gain full access
to the system
Physical damage – Literally wreck the system
Define Hacking
Hacking is intentionally using a computer resource
– totally without authorisation
– or in excess of authorisation
Is it a crime to write malware
Not usually but its a crime to release it.
Define ransomeware
Ransomware became one of the most common forms of malware . It works by
– Infecting your O/S
– Encrypting all data
– Demanding a ransom in a digital currency.
– Typically, you have 24 hours to pay.
Give an example of a ransomware attack
HSE May 2021
Describe the ransomware sequence of events
- Distribution Campaign : phishing emails and websites.
- Malicious Code Infection : The dropper downloads an executable to install ransomware
- Malicious Payload Staging ransomware embeds itself in the system.
- Scanning : ransomware finds content to encrypt.
- Encryption Files and folder are encrypted
- Payday : A ransom note with instructions on how to pay the ransom.
Define DoS attacks
Denial of Service attacks - Installing bots in devices.
Describe how IT sabotage may be used by terrorists
Cyberattacks by cyberterrorists
– Cyberattacks on utilities grids
– Financial disruption