Chapter 9 Flashcards
(34 cards)
Define cyber risk
Is any risk of financial loss, disruption of business, or damage to an organizations reputation due to the failure of its information technology system
Explain Denial of service (DoS) attack
Perpetrated internally or externally to disable an organizations network and e-commerce services
DDoS attacks when multiple compromised systems flood the bandwidth or resource of targeted system
Explain social engineering attack
A set of techniques that cyber criminals use to induce the targeted custom to take an action
Includes: phishing, business email compromise, and URL hijacking
Explain virus
a computer program that can copy itself or corrupt files on a targeted computer without the users permission or knowledge
Explain Trojan horse
A legitimate program into which an unauthorized code is inserted, causing it to change its functions to the legitimate user or system owners
Explain worm
A self-replicating computer program that uses a network to send copies of itself to other computer terminals on a network
Explain theft of intellectual property
Can include copyright infringement, piracy of software, and theft of digital intellectual property
Includes corporate espionage
Explain intrusion offences
Relate to unauthorized access to computer systems
Threat actors often execute ransomeware have system access
Explain attacks to critical infrastructure
Threaten the basic structural foundations of this media
Attacks to critical computer infrastructure threaten the economy, public safety, public health, and the national security of a country
Explain extortion
Use ransomeware to illegally access encrypt, and/or copy files and threaten to expose the files publicly, sell the data on the dark web, or otherwise make available the data if a ransom is not paid
Explain web defacement
Refers to malicious altering of a webpage by intruders by inserting or substituting provocative and offending data
Explain remote hacking
Software vulnerabilities in autonomous vehicles or drones are exploited to gain control of the vehicle or drone
Explain deepfake attacks
Synthetic media that includes fake images, audio recordings, and videos by leveraging generative artificial intelligence
Explain multi-vector threats
A combination of various attacks in a single attack campaign
Explain bot scam
Viruses that take over large numbers of computers
What are the exposures arising from cyber crime?
Loss of reputation-additional costs with trying to restore reputation via communication
Contingency business interruption- occurs as a result of a cybercrime that will affect the company’s ability to operate
Financial fraud-transactions can be compromised, or fradster might steal funds from active account
Theft of customer data
Identity theft- for both customers and employees
Define cyber crime
Any crime where a cyber element (that is, the internet and information technologies such as computers, tablets, or smart phones) has a substantial role in the commission of a criminal offences
What amendments have been made to the criminal code in regards to cybercrime?
The following actives are illegal:
Use a computer without authorization
Make a mischief in relation to data
Possess a device to obtain telecommunication facility or service without authorization
Steal telecommunication service
What are ways to maintain and update technology resources in regard to cybercrime?
Install and maintain anti-virus software
Install and enable firewalls
Install software patches as they are made available
Use anti-spyware tools
Use outside technical expertise when required
Disable access to the network after employees are terminated
What are ways to maintain vigilance on the network in regard to cybercrime?
Practice regular diagnostic testing and monitoring
Analyze operations to identify areas vulnerable
Remove unused software
Remove unused user accounts
Conduct reference checks on employees
Monitor employee online activity
Deal with internal and external sources
Implement a forensic response plan
Develop business continuity plans
What are ways to insitiute employee protocols in regard to cybercrime?
Train all employees
Use a third party cybersecurity vendor
Document and implement policies and procedures
Implement password system
Use caution with email attachments
Limit access to information
Have users lock their computers
Restrict to whom employees send “out of office”
Limit or restrict use of hot spots as well as others
Do not allow downloads
Prepare a user agreement for computers; require employees to sign it
Prior to granting cyber coverage underwriters want to verify what?
Established technology protocols
Employee user-agreement contracts that specify non-abuse of company data
The implementation and enforcement of IT security
A robust data recovery plan that is regularly backed up
Define epidemic
An above-average but limited incidence of an infectious disease such as influenza, cholera, and severe acute respiratory syndrome.
Any disorder in which infectious viruses or bacteria are easily transmitted can cause an epidemic
Define endemic
To the presence of an infectious disease in a certain region at all times for a significant percentage of the population
Example: Malaria