External Threats Flashcards

(16 cards)

1
Q

What are the 8 types of external threat?

A

Unauthorised access or hacking
Malware
Denial of service attacks
Phishing
Pharming
Social engineering
Shoulder surfing
Man-in-the-middle attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Malware?

A

When hackers install themselves on computers without the users, knowledge and encrypt, steal or delete data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Phishing?

A

When someone sends fake emails which appear to be a genuine request. This then takes them to a website where they are asked to enter their login details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is pharming?

A

when someone redirects someone’s web browser destined for a genuine site onto a fake version. They are asked to confirm the login details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is social engineering?

A

when someone attempts to trick users into giving their bank or other login details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Man-in-the-middle attack?

A

When an attack is able to intercept and sometimes alter data, the use of sending and receiving through public Wi-Fi connections which are not encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are three impacts of security breaches?

A

Data loss
Financial loss
Legal action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a benefit or drawback of firewalls?

A

Benefit- helps block suspicious data
Drawback- Hardware firewalls can be expensive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are benefits and drawbacks of software and interface designs?

A

Benefit- protects against shoulder surfing in public places

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are two drawbacks of installing unapproved software?

A

Increases threat of another type of security breach
Programs may not be incompatible with the organisation’s software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the five steps to do after an attack?

A

Investigate
Respond
Manage
Recover
Analyse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are one drawback of transactional data and location-based data?

A

Financial information can be stolen
Could pose a serious risk to the individual’s safety and privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are three ways to reduce the environmental impacts of technology?

A

Auto power-off
Power-saving mode
Sleep mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are acceptable and unacceptable behaviours of employees?

A

Required to keep passwords confidential
Must not download non work related materials, software, music and video files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is two-factor authentication?

A

It requires a user to authenticate using two different factors e.g password and biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a benefit and drawbacks of authentication?

A

Benefit- the user does not need to remember anything other than their password
Drawback- on a digital system it requires additional hardware and/or software