A1 - Cyber Security Threats (External) Flashcards

A - Cyber Security Threats, System Vulnerabilities and Security Protection Methods

1
Q

External Threats

A

➡ An external threat refers to the risk of somebody from the outside of a company who attempts to exploit system vulnerabilities through the use of malicious software, hacking, sabotage or social engineering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Malicious software (malware)

A

➡ Malicious software encompasses a wide range of software, each of which has the purpose of causing damage to a computer system. Some are less harmful than others, for example, adware, meanwhile, others can render a hard drive inoperable,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Spyware

A

➡ gathers information on the user it has infected, secretly sending it away to third-party sources – this may be through the use of keyloggers, which get information from what you type, such as passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Adware

A

➡ displays unwanted advertisements used to generate revenue, sometimes obstructing the user through the use of pop-ups that don’t disappear when you close them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ransomeware

A

➡ prevents you from accessing your computer system, often by encrypting the storage devices, and demands a sum of money to be paid in order to gain access back.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Viruses

A

➡ modify existing programs with malicious code and constantly replicates itself throughout a computer. They usually cause the corruption of data and applications, system failure & take up storage space or processing power.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Worms

A

➡ Worms perform a similar function to viruses. However, worms can replicate themselves through a network to spread to other computers, rather than through infecting files that are spread. This allows them to perform similar functions to viruses but on a much larger scale

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Rootkits

A

➡ are used to get unauthorised remote administrator access to a computer or network. They typically spread by hiding in software that appears to offer legitimate functionality. This can then be used to steal data or hide other malware within the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Trojans

A

➡ malicious code that hides within a seemingly legitimate program. Typically, users are misled and download the Trojan themselves by thinking it’s a program they would like to use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Hacking

A

➡ describes the exploitation of vulnerabilities in a computer system to gain unauthorized access to the system and its data. The method of attack is known as the “attack vector” and often involves exploiting vulnerabilities in areas like Wi-Fi, Bluetooth, the internet connection or through gaining internal network access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Individual Hacking motive

A

➡ Carried out the threat by an individual, due to making money, protest or revenge known as hacktivists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Commercial Hacking motive

A

➡ When corporates attack their business competitors and rivals in order to gain intel and data about their plans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Government Hacking motive

A

➡ Companies and governments will also hire others to hack themselves. So-called “white hat” hacking, which is used to detect system vulnerabilities so that they can prevent threats from malicious “black hat” hackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Sabotage

A

➡ Sabotage is a general term that describes an activity used to deliberately disrupt services, through:

  • Denial of service attack
  • Distributing malware
  • Physically destroy computer equipment
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Social Engineering

A

➡ Social engineering refers to the techniques used to deceive people into revealing private and confidential information. This can then be used for bank fraud & identity fraud or to gain access to systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Operational Loss

A

➡ Operational losses refer to damages of the operating capability of an organisation. This includes a loss of:
- Manufacturing output
- Service availability
- Service data.

17
Q

Financial Loss

A

➡ Financial losses refer to damages to the wealth of an organization. This includes:
- Organizational losses
- Compensation
- Legal fees.

18
Q

Reputation Loss

A

➡ Reputation losses are the loss of trust and lowered opinion of a business due to threats such as lack of service, cybersecurity threats, or data theft. Customers may lose interest in a business due to concerns about availability, while businesses may not provide necessary data, leading to potential business relocation.

19
Q

Intellectual Property Loss

A

➡ Intellectual property losses occur when product designs or trade secrets are stolen, causing adverse effects on an organization. This can be done by competitors, corporate espionage, or individuals seeking to blackmail or release the organization, leading to financial and reputational losses.