LO4 Flashcards
(99 cards)
Cyber security
Consists of the processes, practices and technologies designed to protect networks computers, programs and data from attack damage or unauthorised access.
An asset
An asset is any device, data, or perception that has value to an organisation
The goal of cyber security
to protect assets
Give one tangible asset and one intangible asset
A server is tangible
Reputation is intangible
A cyber attack seeks to what
Damage, steal or destroy an asset.
What does a threat have potential for
To harm an asset
What is a vunerability
A vulnerability is a weakness in an asset or prevention measure which can be exploited in an attack
If we have no vulnerabilities do we have any threats
no but this is unrealistic
Prevention measures
A prevention measure aims to reduce the risk of an asset being exploited in an attack
Does the prevention measure destroy a threat
The threat will still exist but the prevention measure may prevent it from ever happening
Mitigation of risks meaning what
is reducing the risk of an attack happening or reducing its impact if it does
What should you do with data once its purpose has run its course
Have it be securely destroyed
securely destroyed data definition
The data cannot be retrieved
How does a magnetic wipe destroy data
It destroys thew magnetic patterns which store the data, making them random and unreadable.
Overwriting advantage + what it is
Allows the device to keep working as normal.
It involves replacing the data which is to be destroyed with random data instead.
Morality
Morality generally refers to our personal view
Ethics
Ethics generally come from a group or wider society
Legalisation
Some immoral or unethical actions are punishable by law, some are not.
Defamation of character
Someone says something untrue about you which causes serious damage to your reputation, it may be both immoral and unethical, and also illegal.
What law is designed to protect intellectual property (IP) from being stolen
Copyrights, designs and patents Act of (1988)
Copyrights, designs and patents Act of (1988)
What law is designed to protect intellectual property (IP) from being stolen
Computer misuse act (1990)
Unauthorised access to a computer is illegal and can be punished
It can punish and creating malware. Law
Computer misuse act (1990)
What makes it illegal to access computer systems without permission
The CMA