LO2 Flashcards
(26 cards)
Name different threats to cyber security
Vulnerabilities Accidental Intentional Organised State sponsored
What is Vulnerabilities threat to cybersecurity
Any weakness within a computer system, network and procedures that leaves the security of information exposed to a threat from a cyber attack
What is accidental threat to cyber security
Unintentional events, for example spilling liquid on a computer, responding to a phishing email, accidental upload of malware or accidental deletion of data
What is intentional threat to cyber security
Criminal activities intent on harming computer systems, for example hacking, social engineering
What is organised crime threat to cyber security and the forms of it
cyber crimes that are organised individually or group organised in order to gain something There are two forms of organised crime cyber enabled crime and cyber dependent crime
What is cyber enabled crime
Illegal activities that can be carried out without the use of computers for examples fraud, theft and bullying using IT
What is cyber dependent
illegal activities that depend on the use of computers and internet for example spreading malware and hacking
What is state sponsored crime
Countries spying on each other to obtain information such as military campaigns, government policies and to spread fake news
Name the types of hackers
Hacktivist Cyber criminal Insider Script Kiddie Vulnerability broker Scammers (Cyber enabled) Phishers (cyber dependent) Cyber terrorists
what activity does a hacktivist do and list motivations of a hacktivist
Politically or socially motivated
- Disagree with someone else view point
What activity does cyber criminal do and list of motivations
Use computers to perform malicious activities eg, identity and data theft and spreading viruses, also use computers for sending spam or committing fraud, use computers as an accessory to save stolen or illegal data
Create havoc
financial gain
What activtiy does an insider do and list of motivations
Threat from within an organisation such as an employee, former employee and these threats can be malicious or accidental
- Personal use
- financial gain
- Revenge to settle a score
What activity does a script kiddle do and list of motivations
Use existing computer scripts or code to hack into computers and deface websites
wants the power of a hacker without the training involved
thrill of hacking
publicity
what activities does a vulnerability broker and list of motivations
find bugs in programs and systems of other companies and may sell information to other companies who are concerned
financial gain
what activity does a scammer do and list of motivation
offer goods or opportunities to others to make quick money by sending emails with false links
financial gain
what activity does a phisher do and list of motivation
obtain sensitive information for malicious intent such as obtaining credit card details to steal money by redirecting the person to a false website
financial gain
theft of intellectual property
identity theft
what activity does a cyber terrorist do and list of motivations
Use computers and communication systems to cause fear in society through the destruction of property and systems by spreading malicious content
- To install fear in others
- Intimidate society into changing for the purpose of an ideological goal
List targets for cyber security threats
People
organisations
equipment
ways people can be targeted
Internet shopping for example fake websites
emails by sending fake links
ways organisation can be targeted
internal/external hacking
Denial of service
data misuse
theft of data
ways equipment can be targeted
stolen equipment
used under an unsecure network
left unattended
Name the three types of hackers
White hat hackers
black hat hackers
grey hat hackers
What are white hat hackers
Ethical hackers employed by organisations to identify vulnerabilities in their systems/ networks
what are black hat hackers
hacker who breaks into computer systems or networks with malicious intent such as destroying data or stealing data for personal use