T1 | Threats to Data Flashcards

(30 cards)

1
Q

Data held by organisations causes 2 issues?

A
  1. Integrity

2. Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data Integrity

A

Keeping data accurate and complete

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data Security

A

Keeping data safe from being stolen or misused

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

One way that data is destroyed/lost?

A

Accidental damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Compromised data statistics

A

7 billion user accounts in total

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Malware

A

Designed to compromise computer functions, cause damage or steal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Virus

A
  1. Software program (attaches to program)
  2. Has to be run by the user (once run it replicates itself)
  3. Viruses can steal info
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

BotNet

A
  1. A collection of internet-connected devices known as zombies
  2. Spread across IoT devices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Examples of what a BotNet will do?

A
  1. Launch attacks on sites
  2. Send spam
  3. Launch phishing attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Virus effects

A
  1. Slowdown PC (freeze/crash PC)
  2. Will modify/delete files
  3. Thrash HDD and print solid black pages (to break HDD and printer)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Worms

A

Uses PC networks and security holes to replicate itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What do Worms do?

A
  1. Designed to steal/delete data

2. DDoS attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Trojan Horse

A

Users are tricked by an advert/cracked software/fake email | The user will run the software containing the Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What do Trojans do?

A
  1. May delete/copy/modify data
  2. Modify PC performance
  3. Ransomware can be installed via this
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Ransomware

A

Holds users data at ransom by encrypting files. Only a payment will give you the decryption key to get your data back

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How to limit effects of Ransomware?

A
  1. Create backups

2. Regularly scan for viruses

17
Q

Denial of Service Attack (DoS)

A

Causes a huge increase of traffic to a particular server, making it slow down or shut down

18
Q

Distributed Denial of Service Attack (DDoS)

A

Multiple systems flooding the server (carried out via a BotNet)

19
Q

Spyware

A

Used to track your activity (e.g. keylogger)

20
Q

Effects of Spyware

A
  1. Slow down PC

2. Loss of data

21
Q

Spreading Malware

A
  1. Portable devices (USB)

2. Links on emails

22
Q

Hacker definition

A

Someone who breaks into computer systems

23
Q

Black Hat

A

Illegal activity such as writing malware

24
Q

White Hat

A

Finds vulnerabilities and weaknesses with companies permission

25
Grey Hat
Finds vulnerabilities without permission. if issues are found they ask for payment, if no fee is paid, then it may be released to the public
26
Motivations of Hacking
1. Financial gain 2. Data theft/identity theft 3. Disruption (protest) 4. Personal attack
27
Password cracking
May use software that tries combinations (brute force attack)
28
What is Phishing?
Type of scam, usually a fraudulent email that appears to come from a legitimate company
29
What percentage of phishing scams work?
5%
30
Phishing scams - What to look out for?
1. Impersonal greeting (e.g. dear valued customer) 2. Sense of urgency 3. Poor spelling/grammar 4. Requests personal information