Year 9 topic 1 - Cyber Security Flashcards
To prepare for the Cyber Security End of Topic Test as well as the end of year exam
What is data/information
Data - facts and figures
Information - created when data is given context
Uk Law - Data Protection Act (2018)
Organisations must use data fairly, openly and accordance with law
For specific/stated reason
Only in way that is necessary and sufficient for purpose it was collected for
Which is accurate and up to date
Only for as long as needed
Protect data from loss damage and unauthorized access
UK law - Data Protection Act (part 2)
You have the right to find out how data is being used
Access data that organisation has about you
Update data
Have data deleted
Stop organisation from processing your data
Transfer data to other organisation
Profiling of data
User data is collected by businesses for profiling (data that helps business earn more profit)
Computer Misuse Act (1990)
Makes illegal to:
Gain unauthorized access to computer material with intent to commit or facilitate other offences (up to 5 years in prison and an unlimited fine)
Gain unauthorized access to computer material (up to 2 years in prison and £5000 fine)
Impair the operation of a computer without the authorisation to do so (up to 10 years in prison and unlimited fine or, if it endangers national security, a life sentence)
Social Engineering - Shouldering
When hacker gains information by physically viewing victim’s screen. Obvious example is looking over someone’s shoulder while they enter PIN number at bank
Social Engineering - Phishing
When hacker uses fake emails/messages to trick people into sharing confidential information. These usually seem like their from a trustworthy company and are unexpected, contain spelling errors, are generic (not addressed to name) and contain suspicious links.
Cyber security - blagging
The act of obtaining sensitive information through the use of a made-up story to gain an individual’s interest e.g. a person may receive an email from a friend telling them that they’re in trouble and asking them to send money. They usually use urgency, fear (e.g. all of your data will be deleted if you don’t …) requests for help and worry (e.g. your friends are in trouble)
Unethical hackers
Gain unauthorized access to or control of computer to steal data, disrupt services, gain financially, for political reasons or for fun.
Denial of Service Attack (DoS)
Done to stop other computer users being able to access a service being provided by server, causing:
-damage to a company’s reputation
-Harm to individuals e.g. bank users being unable to access money
Ethical Hackers
Gain access to a computer system with permission from owner to help identify faults in computer systems. Some companies pay penetration testers to hack into their computers and tell them how to improve their computer systems. These are ethical hackers.
Distributed Denial of Service Attack (DDoS)
Harder to prevent than a normal DoS attack because requests are coming from multiple sources (Hackers do this by creating fake internet traffic, overwhelming the target’s network)
Since requests come from different sources it is difficult to identify who is behind the attack.
Script Kiddies
Gain access to computer systems using tools they download from the internet (lack expertise to write their own). They’re usually doing this for unethical reasons so can be considered a type of unethical hacker.
Brute Force Attacks
A hacking method that uses trial and error to hack into computer systems. Hackers usually use hand-made computer programs to do this. Can be prevented if IT administrators:
-Limit number of login attempts
-Put a time delay between access attempts
-The use of CAPTCHA (are you a robot?) / 2 factor authentication.
Malware
Malware (software that is designed to disrupt, damage or gain access to computer material) can be used to:
-Disable hardware
-Steal data
-Send email spam with malicious links
-Steal money
-Force advertise/false advertise