8.1.4 Potential physical vulnerabilities to systems, data and information Flashcards

1
Q

Fill The Blank:

Some companys run vulnerability testing (aka …………………… testing) when the digital system is being created and ………………

A

Vulnerability, Penetration, Installed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Fill The Blank:

………………….. testing when the computer system is running to identify …………………. and steps can be taken to close them before an attack is successful

A

Vulnerability, Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Fill The Blank:

The biggest threat to digital systems is the ………… so they must be made aware of the vulnerabilities so that they do not become the start of any issues

A

User

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

State:

The 2 categories that physical threats can be split into

A
  • Internal
  • External
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain:

Two factors affecting the location of physical systems and how these could be mitigated against

Internal Threats

A
  • Area with limited flammable material to limit fire risk (fire alarm system should be installed)
  • Low humidity/ventilation because heat can become humidity and components can corrode or be damaged to the point of not working as intended - Climate controlled area to regulate humidity and temperature
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Fill The Blanks:

The ………….. of digital systems should also be considered as this can also be a ……………………..

Internal Threats

A

Layout, Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

State:

3 examples of physical threats to a system that link to the layout

Internal Threats

A

3 of:
* Door access codes not being updated regularly
* Using simple access codes such as 1234
* Reusing access codes on a rotation basis
* Lack of monitoring of access to secure areas
* Unnecessary access to secure areas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Fill The Blank:

When a digital system is installed it can be assumed the hardware and software will be up to date and can be classed as ……………..

Internal Threats

A

Robust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Fill The Blank:

Over a systems lifetime …………….. must be carried out. Eventually software will be become …………….. or (possibly earlier on) be classed as ……………….. software because there is limited support for interaction with ……………… applications

Internal Threats

A

Maintenance, Obsolete, Legacy, Modern

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Fill The Blank:

If software has become legacy software, it may be chosen to replace it with an up-to-date …………….. which will impact the business; how will ………. be stored during the transfer?

Internal Threats

A

Version, Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Fill The Blank:

Hardware can become outdated because of outdated ………………… or a reduction in ……………………

Internal Threats

A

Firmware, Performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define:

Mitigate

Internal Threats

A

If you mitigate against something, you take steps to reduce the likelihood of it happening, or to reduce its impact if it does happen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define:

Humidity

Internal Threats

A

Amount of water vapour in the air. Higher humidity means more water in the air

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define:

Firmware

Internal Threats

A

Code, added at time of manufacturing, written to a hardware device’s non-volatile memory - software that allows hardware to run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Fill The Blank:

How a digital system and ……….. are used could lead to a …………..

Internal Threats

A

Data, Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Fill The Blank:

Using business devices on unsecured …………. can leave employees vulnerable to attacks

Internal Threats

A

Hotspots

17
Q

Fill The Blank:

Some risk is mitigated through an …….. (if employees follow it) but there is the risk that a ……………………… employee could pose a threat to the hardware and software of the digital system.

Internal Threats

A

AUP, Disgruntled

18
Q

Expain:

2 natural disasters and briefly how they could impact digital systems

External Threats

A
  • Earthquake could stop internet
  • Floods or tsunamis could destroy and wash away buildings
  • Lightning strikes cause surge or spike in electricity supply
19
Q

State:

2 potential impacts of a natural disaster on digital systems

A
  • Any natural disaster could destroy backups
  • Power failure as potential after affects limiting access to data

This is not an extensive list