Security and Safety Flashcards
Hazards to our physical bodies include
Eye strain from viewing the computer screen in poor light, poor posture when using devices, or muscle fatigue that comes from typing on a keyboard.
A common term used to describe individuals who launch attacks against other users and their computers is
Attackers or threat actor
Attackers in organized gangs meet in
hidden online “dark web” forums
When organized gangs of young attackers meet online they
Trade information, buy and sell stolen data and attacker tools, and even coordinate their attacks.
Are individuals who want to attack computers, but lack the knowledge of computers and networks needed to do so.
Script kiddies
Work by downloading freely available automated attack software (scripts) from websites and using it to perform malicious acts
Script kiddies
Are attackers who are strongly motivated by principles or beliefs.
Hactivists
Can involve breaking into a website and changing the contents on the site as a means of making a political statement.
Attacks by hactivists
Attack a nation’s computer networks, like the electrical power grid, to cause disruption and panic among citizens.
Cyberterrorists
Instead of using an army to strike at an adversary, governments are now employing state-sponsored attackers to launch computer attacks against their enemies through
Nation state actors
Another serious security threat to companies can come from its own employees, contractors, and business partners, called
Insiders
A healthcare worker upset about being passed over for a promotion might illegally gather health records on celebrities and sell them to the media. This is an example for a/n
Insiders
The greatest risk comes from attackers who want to steal information for
their own financial gain
Once, the reason for launching computer attacks was for the attackers to
show off their technology skills (fame)
Where do you face risks when using the internet or email
Online banking
E-commerce shopping
Fake websites
Social media sites
Attackers try to steal your password to access your online bank account and transfer your money overseas.
Online banking
Rrisks you face online when using the internet or email
Online banking
E-commerce shopping
Fake websites
Social media sites
When you enter your credit card number to make an online purchase an attacker can try to intercept your card number as it is transmitted over the network
E-commerce shopping
Attackers can set up an “imposter” website that looks just like the site where you pay your monthly credit card bill.
Fake websites
Attackers can ask to be a “friend” on your social media site by pretending to be someone you met or went to school with. Once you accept this new friend the attacker may be able to see personal information about you, such as your pet’s name or your favorite vacation spot. This information could be used to reset your password on another website that requires the answer to the security questions
Social media sites
Gathering your personal information is not something that is done only by attackers it can be done and used by
Organizations such as schools and hospitals
Sell your information to a drug company who sends you information about their drugs
Invalid use by hospitals
Refers your past procedures when you are admitted as a patient
Valid use by hospitals
The process of sorting through extremely large sets of data to uncover patterns and establish relationships
Data mining which many organizations use