Week 10 Flashcards

1
Q

What are the three steps to analyse a threat environment and act

A

Plan, Protect and Respond

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe the planning principles plan if one is in a threat environment in ICT

A

Planning Principles:
Risk Analysis
Comprehensive
Security
Defence in depth
Minimum Permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe how companies can protect themselves if they are in a threat enviornment in ICT

A

Access Control
Firewalls
Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define malware

A

– A general name for evil software
– software intentionally designed to cause damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe vulnerabilities

A

Vulnerabilities are security flaws in specific programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Whats the difference between vulnerability specific malware and universal malware

A

Vulnerability-specific malware requires a specific vulnerability to be effective.

Universal malware does not require a specific vulnerability to be effective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe and define riskware

A

Riskware is software that is potentially
dangerous.

Usually offers some benefit at a “cost”
– Compromises security
– Acts illegally

Riskware might
– Block another application
– Be used as a backdoor for other malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define social engineering attacks

A

Tricking the victim into doing something against his or her interests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define fraud attacks

A

Lying to the user to get the user to do something against his or her financial self-interest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define Phishing attacks

A

Sophisticated social engineering attacks
with authentic-looking e-mail or Website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is SMS not as popular for spam or phishing?

A

Because it costs more

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define credit card theft online?

A

Credit Card Number Theft
– Performed by “carders”
– Make purchases with stolen credit card or steal from online account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define identity theft online

A

– Collecting enough data to impersonate the victim in large financial transactions

– May take a long time to restore the victim’s credit rating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define vandalism

A

Vandalism/Sabotage:

– Deliberate damage to hardware, software and/or data, including companies’ websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why are disgruntled employees and en-employees dangerous

A

– Extensive access to systems, with privileges
– Knowledge about how systems work
– Knowledge about how to avoid detection
Business need to immediately withdraw network access if they dispense with the
services of an employee.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are common deliberate indvidual sabotage methods

A

Logic Bomb– Destructive computer program that activates at a
certain time or in reaction to a specific event

Back door – Section of program code that allows a user to circumvent security procedures and gain full access
to the system

Physical damage – Literally wreck the system

17
Q

Define Hacking

A

Hacking is intentionally using a computer resource
– totally without authorisation
– or in excess of authorisation

18
Q

Is it a crime to write malware

A

Not usually but its a crime to release it.

19
Q

Define ransomeware

A

Ransomware became one of the most common forms of malware . It works by

– Infecting your O/S
– Encrypting all data
– Demanding a ransom in a digital currency.
– Typically, you have 24 hours to pay.

20
Q

Give an example of a ransomware attack

A

HSE May 2021

21
Q

Describe the ransomware sequence of events

A
  • Distribution Campaign : phishing emails and websites.
  • Malicious Code Infection : The dropper downloads an executable to install ransomware
  • Malicious Payload Staging ransomware embeds itself in the system.
  • Scanning : ransomware finds content to encrypt.
  • Encryption Files and folder are encrypted
  • Payday : A ransom note with instructions on how to pay the ransom.
22
Q

Define DoS attacks

A

Denial of Service attacks - Installing bots in devices.

23
Q

Describe how IT sabotage may be used by terrorists

A

Cyberattacks by cyberterrorists
– Cyberattacks on utilities grids
– Financial disruption