Threats to data Flashcards

1
Q

Phishing

A
  • sending email to user falsely claiming to be a genuine enterprise in attempt to scam the user into giving private information that will be used for identity theft
  • email directs user to website which captures and steals and information that user types
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Effects and preventions of phishing

A
  • identity theft, financial losses, loss in productivity
  • don’t give personal info any random requests for information, don’t open unknown emials, use antivirus and firewall, delete messages that appear to be spam
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hacking

A
  • unauthorised access to manipulate the normal behaviour of network connections and connected systems
  • goes through scripts and other network programming
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Effects and preventions of hacking

A
  • exposure of sensitive information, risk to privacy, risk to national security
  • before connecting to public wifi, check if network name is real, disable wifi when not in use (prevents it from connecting automatically), change passwords often, check permissions on apps before installing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Virus

A
  • small software programs which are designed to spread from one computer to another, with the intention of causing interference with the computer operation.
  • commonly spread by attachments in emails or instant messaging
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Effects and preventions of virus

A
  • corrupts files - interrupting internet traffic and taking over simple functions of your operating system, software can record keystrokes and screen data, personal info can be transmitted to people behind malware
  • keep computer current with latest updates and antivirus software, antivirus, stay informed about recent threats, run computer as a standard user, only open email attachments from contacts you know
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Trojan

A
  • malware disguised as legitimate software. Can be employed by internet thieves and hackers that intend to gain access to users systems
  • users tricked by form of social engineering into loading and performing trojans on their systems. Allows defenders to spy, steal and gain access to data.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Effects and preventions of trojans

A
  • key Logger programs send report of all buttons and keys you press on the keyboard to the hacker, corrupts data, bugs, install backdoor access program to your computer, financial losses
  • antivirus, firewalls, organise user accounts permissions on your computer so accounts with full administrative rights are only used to install or update software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Interception

A

Unofficial party has gained access to an asset. The outside party can be a person, program or computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Effects and prevention of interception

A
  • illegal copying or program or data files, wire trapping may be carried out to take sensitive data from a person or company, financial losesses
  • traffic encryption, data should be passed through the ISP network and further - outside your home country is encrypted. No staff or government authorities can intercept your data.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Eavesdropping

A

Intercepting conversations without the awareness or consent of at least one of the participants.

Specialised program used to sniff and record packets of data communication from a network and then after it’s listened to or read using tools for analysis and decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Effects and preventions of eavesdropping

A
  • thieves can steal personal data, users behind the electronic intercepting may record your conversations
  • encryption (HTTPS), understand which devices are present on your network and carefully control the software that is installed on them
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data theft

A

Information illegally copied or stolen from a business or person. Information regards passwords, card details and etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Effects and preventions of data theft

A
  • loss of data on portable devices, thieves can email sensitive data to others, data can be removed copied from a company
  • encrypt corporate data, protect mobile devices, carry out security risk assessments and security checks, protect wireless network by changing passwords, ban or restrict use of portable devices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Social engineering

A

Influencing people so they give up private information. Criminals trick you into giving them your passwords or ban info or access your computer secretly to install malicious software. This gives them control over your whole computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Social engineering effects and preventions

A
  • exploits a person to trust their word, blackmail after a relationship develops between criminal and user, sensitive data may be exposed
  • biometrics, delete requests for financial information, reject requests for help, be cautious of any uninvited messages