T1 | Threats to Data Flashcards

1
Q

Data held by organisations causes 2 issues?

A
  1. Integrity

2. Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data Integrity

A

Keeping data accurate and complete

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data Security

A

Keeping data safe from being stolen or misused

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

One way that data is destroyed/lost?

A

Accidental damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Compromised data statistics

A

7 billion user accounts in total

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Malware

A

Designed to compromise computer functions, cause damage or steal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Virus

A
  1. Software program (attaches to program)
  2. Has to be run by the user (once run it replicates itself)
  3. Viruses can steal info
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

BotNet

A
  1. A collection of internet-connected devices known as zombies
  2. Spread across IoT devices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Examples of what a BotNet will do?

A
  1. Launch attacks on sites
  2. Send spam
  3. Launch phishing attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Virus effects

A
  1. Slowdown PC (freeze/crash PC)
  2. Will modify/delete files
  3. Thrash HDD and print solid black pages (to break HDD and printer)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Worms

A

Uses PC networks and security holes to replicate itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What do Worms do?

A
  1. Designed to steal/delete data

2. DDoS attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Trojan Horse

A

Users are tricked by an advert/cracked software/fake email | The user will run the software containing the Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What do Trojans do?

A
  1. May delete/copy/modify data
  2. Modify PC performance
  3. Ransomware can be installed via this
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Ransomware

A

Holds users data at ransom by encrypting files. Only a payment will give you the decryption key to get your data back

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How to limit effects of Ransomware?

A
  1. Create backups

2. Regularly scan for viruses

17
Q

Denial of Service Attack (DoS)

A

Causes a huge increase of traffic to a particular server, making it slow down or shut down

18
Q

Distributed Denial of Service Attack (DDoS)

A

Multiple systems flooding the server (carried out via a BotNet)

19
Q

Spyware

A

Used to track your activity (e.g. keylogger)

20
Q

Effects of Spyware

A
  1. Slow down PC

2. Loss of data

21
Q

Spreading Malware

A
  1. Portable devices (USB)

2. Links on emails

22
Q

Hacker definition

A

Someone who breaks into computer systems

23
Q

Black Hat

A

Illegal activity such as writing malware

24
Q

White Hat

A

Finds vulnerabilities and weaknesses with companies permission

25
Q

Grey Hat

A

Finds vulnerabilities without permission. if issues are found they ask for payment, if no fee is paid, then it may be released to the public

26
Q

Motivations of Hacking

A
  1. Financial gain
  2. Data theft/identity theft
  3. Disruption (protest)
  4. Personal attack
27
Q

Password cracking

A

May use software that tries combinations (brute force attack)

28
Q

What is Phishing?

A

Type of scam, usually a fraudulent email that appears to come from a legitimate company

29
Q

What percentage of phishing scams work?

A

5%

30
Q

Phishing scams - What to look out for?

A
  1. Impersonal greeting (e.g. dear valued customer)
  2. Sense of urgency
  3. Poor spelling/grammar
  4. Requests personal information