Data Storage Requirements in relation to Security and Protection and how they help to prevent common threats Flashcards
10.1 Key Requirements of Legislation relating to the security of info and data (29 cards)
What is a cyberattack?
Cyberattacks are malicious attacks with the intent to cause harm.
Who do cyberattacks target?
Government or national infrastructure
What can cyber attacks also be referred to as?
cyberwarfare and cyberterrorism.
Why do security steps need to be taken to protect the data from cyberattacks?
Security steps need to be take to protect data and reduce the risk of illegal access by cybercriminals e.g. bank details.
What are the two biggest cyberattacks threats to businesses and organisations?
- Phishing
- Malware
What are the cyberattacks potential indicators to look out for?
- Spelling mistakes, on inappropriate use of language
- Poor quality images or images of text
- Fake links
What is Phishing?
A type of spam email used by cybercriminals used to steal info from devise users by pretending to be somone the user trusts.
What are some examples of ways phishing attacks are undertaken?
- Texts
- Phone calls
- Mail asking for the recipient to contact them.
Are physhing attacks targeted?
No, they are sent to random individuals hoping that some will be fooled. however some attacks may be targeted at individuals who work in a specific organisation/business.
What are targated phishing attacks called?
Spear phising attacks
What is malware?
Malware is malicious software designed by a cybercriminal to damage or disrupt computer software of hardware.
Why do cybercriminals create mallware?
- to impact the performance of a computer device by using up resources such as disk space or processing capacity to make the computer device run slowly.
- to lock users out of their devices or allow illegal activities to be undertaken on the device without the user knowing.
What are the 2 most common types of malware?
- Adware
- Spyware
What is Adware?
Forces unwanted or irritating advertising, such as pop-ups, to be displayed on a device when the user is online
What is Spyware?
It enables cybercriminals to monitor the actions of the device used without their knowledge (usually used to steal sensitive info like passwords or bank details)
What is trojans and how does it get setup?
a type of malware, that attaches itself to the device start-up routine and monitors what the user does one the user connects to the internet.
What do trojens allow the designer do?
It allows the individual who designed it to take control of the user’s device and steal, damage, or perfrom harmdful actions without the user realising.
What is a virus and how is it setup?
A self-replication software usually transmitted through internet connections that attaches to an application, when the application in then used, the virus makes a copy of itself on the user’s device and will continue to run, or run every time the application is used.
What do viruses do?
It can corrupt data or provide cybercriminals with access to the device.
What are worms and how is it setup?
The are self-replicating, standalone application that does not require a device user to execute it. It is spread through network connections and looks for and exploits security vulnerabilities to install itself on other devices.
How can you reduce the risk of a cyber attack?
ONLY REMEMBER 4-5:
* only store data for as long as it is needed.
* anonymise data to reduce access to non-essential info
* Providing regular training for staff on data protection
* using different emails for work and private
* reviewing access privileges for applications
* reviewing social media privacy
* reviewing the settings on mobile devices to restrict location access
* not buying or using pirated software
* keeping software up to date
* using strong passwords
* be aware of security risks on public Wi-Fi
* block unwanted cookies and pop-ups
* using multi-factor authentication
What is Multi-Factor Authentication?
an account log-in process that requires a used to enter two or more pieces of evidence in order to gain access. also know as fwo-factor authentication.
What other evidance might the user have to enter for multi-factor authentication?
- answer a secret question (e.g. pets first name)
- Entre a unique pin or code sent to their email or phone number
- Provide biometric information (e.g. face recognition or fingerprint)
What will backing-up data enable businesses and organisations to do?
to recover data quickly is it is lost and help if the data becomes corrupted.