Threats to Cyber Security Flashcards

1
Q

What are vulnerabilities?

A

Flaws in a system security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is botnet?

A

Placing malware on a groups of computers to get network control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is social engineering?

A

Influencing someone to hand over confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are physical threats?

A

Loss or theft of equipment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are environmental threats?

A

any threat resulting from a natural event`

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are environmental threat examples?

A
  • Flood
  • Fire
  • Earthquake
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are examples of accidental threats?

A
  • Dropping an item
  • Accidentally upload malware
  • Accidental deletion
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are intentional threats?

A

The intention to cause harm to the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is cyber enabled crime?

A

Crimes such as fraud, theft and bullying using IT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is cyber dependent crime?

A

Crimes done using computer networks or systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is money laundering?

A

Hiding origins of money by transferring it through multiple bank accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is data mining?

A

Collect information on businesses and individuals to enable crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are examples of data mining?

A
  • Identity theft
  • Stealing intellectual property
  • blackmail
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are state sponsored threats?

A

Spies hack into networks of foreign powers to identify vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why are state sponsored threats used?

A

The country that is spying can use the information to undermine its enemies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are examples of intentional threats?

A

Social engineering, hacking and theft.

17
Q

What are examples of cyber dependent crime?

A

spreading malware, hacking and denial of service attacks.