Chapter 8 - Cyber security threats Flashcards
What is cyber risk?
Cyber risk is the risk of financial loss, disruption, or damage to the reputation of an organisation caused by issues with information technology system it uses
What are the three main forms of sensitive information that an organisation may hold?
Personal information
Business information
Classified information - held by government and could harm national security if discovered
What are the cyber security objectives?
Availability
Confidentiality
Integrity of data
Intergrity of processing
What is malware?
Term used to describe different types of malicious software, regardless of the purpose
What is ransomware?
Software that prevents access to data until a ransom is paid
What is botnets?
Network of infected computers that are under control of an attacker
What is spyware?
Malware that is designed to spy on the victim and report back to attacker
What is trojans?
Legitimate software that secretly contains and releases malicious software onto a system
What is malvertising?
Online advertising that has malicious software written into its code
What is a virus?
Malware that replicates itself and spreads through programs, files and data
What are some common types of application attacks?
Denial of service attack
Distributed denial of service attack
SQL (Structured Query Language) injection
Cross-site scripting attacks
Man in the middle
Buffer overflow attack
What is a denial of service attack?
Attempt to overwhelm an applications resources to prevent is from working
What is distributed denial of service attack?
DDoS is where the source is from a number host machines, usually linked to Botnets under the control of an attacker
What is Structured Query Language injection?
SQL is a request for something of a database
What is cross-site scripting attacks?
Occurs when malicious code is transmitted from a website and can access the victims’ data
What is the man in the middle?
When the application is compromised so that the users believe they are communicating directly as normal, but someone is intercepting the communications and potentially changing them
What is buffer overflow attack?
Attack that overwhelms a systems resources.
What is hacking?
Gaining of unauthorised access to a computer system
What are unethical hackers?
Stereotypical hacker that accesses a system without permission with malicious intent
What are ethical hackers?
Attempt to access an organisations systems with permission from the organisation to help them understand weaknesses
What is social engineering?
Manipulation of people to make them perform specific actions or reveal confidential information
What are the six principles that Dr Robert Cialdini identified to persuade or influence someone?
Reciprocity
Scarcity
Authority
Consistency
Liking
Consensus
What is phishing?
Use of fradulent communications to steal sensitive information
What is spear phishing?
Phishing attempt targeted at a specific individual who is deemed to have specific information or priveleged access to something