Cyber-security Threats and Prevention Measures

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/58

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

59 Terms

1
New cards

Malware

(Malicious Software) Malware is installed on a computer system and collects information about users without their knowledge.

2
New cards

Hacking

Hacking means finding a weakness in an established system and exploiting them.

3
New cards

Adware

Advertising-supported software which generates revenue for its author.

4
New cards

Cyber-security

The practice of defending digital devices, including computers, servers, mobile devices, electronic systems, networks and data, from malicious attacks.

5
New cards

Black Hat Hacking

The hacker hacks into the computer system with malicious intent. The intent can include theft, exploiting the data stolen or seen, and selling the data on. Black hat hackers carry out illegal hacking activities and can be prosecuted.

6
New cards

Botnet

A botnet, and the person who created it attempts to take control of digital systems.

7
New cards

Ransomware

Holds a computer system captive and demands a ransom, usually money, to release it.

8
New cards

DoS

(Denial of Service) An attempt to make a digital system, for example a network or website, unavailable to its users by flooding it with network traffic.

9
New cards

Grey Hat Hacking

The hacker hacks into the computer system for fun or to troll but does not have malicious intent towards the computer system. If they find a vulnerability, they offer to fix it - but for a fee. They can manipulate rankings of website in a search engine.

10
New cards

Spyware

Spyware can collect data from an infected digital system, including personal information like websites visited, user logins and financial information.

11
New cards

Trojan horse

A standalone malicious program designed to give full control of an infected digital system to another digital system.

12
New cards

White Hat Hacking

The hacker is given permission to hack into systems to identify any loopholes or vulnerabilities. White hat hackers are motivated to keep the computer systems as safe as possible from malicious hacking attempts.

13
New cards

Virus

A virus attempts to make a computer system unreliable.

14
New cards

Social engineering

The art of manipulating people so that confidential information can be found out.

15
New cards

Worm

A standalone computer program that replicates itself so it can spread to other computers.

16
New cards

Baiting

Tries to get victims to give cybercriminals the information they need with promises of goods in return.

17
New cards

Phishing

Tries to get users to input their credit or debit card numbers, or security details or log-in details, into a fake website.

18
New cards

Quid pro quo

Tries to disable anti-virus software so that software updates, usually malware, can be installed to gain access to a digital system.

19
New cards

Shoulder surfing

Aims to steal data or information by overseeing what an individual is viewing/typing.

20
New cards

Scareware

Tries to scare people into downloading and buying useless software.

21
New cards

Pretexting

A cybercriminal lies to get data or information.

22
New cards

Data Destruction

Data is destroyed by a cyber-security attacker and no longer exists. E.g. Attacker deletes customers' orders.

23
New cards

Biometric devices

Devices which use a physical characteristic of the user, such as a fingerprint, eye scan or voice, which needs to be positive match before the device can be accessed.

24
New cards

Keypads

A type of lock where the correct code must be inputted before the lock opens.

25
New cards

Data Manipulation

Data is edited, usually to meet the needs of the cyber-security attacker. E.g. Attacker changes the data in a news feed on social media platforms.

26
New cards

RFID (Radio-frequency Identification)

Access badges or tags that use radio frequency to transfer data from the tags to a digital system, for example to allow access to a room.

27
New cards

Data Modification

It changes data to meet the needs of the attacker. However, the attacker usually has different aims and the crime may not be found for a long time. E.g. Attacker changes the amount of money in a bank account and the increased amount of money.

28
New cards

Logical prevention measures

Software based techniques used to authenticate a user.

29
New cards

2FA (Two-factor Authentication)

A process to verify a user logging into their account by receiving a token via an authorised method and entering this token to gain access.

30
New cards

Access rights and Permissions

A set of attributes that can be set to determine what a user can do with files and folders. E.g. read, write, edit, delete.

31
New cards

Data Theft

Cyber-attacker steals computer-based data from a person or organisation, with the intent of compromising privacy or obtaining confidential information. Can occur when the data is at rest or in transit.

32
New cards

Encryption

The process of encoding files or data.

33
New cards

Data at rest

The data is not moving from device to device or network to network. The data is stored on, for example, a hard drive, laptop, flash drive or archived by an organisation.

34
New cards

Asymmetric encryption

(Public key encryption) The encryption key is available to anyone to encrypt data but only the person who receives the data receives the decryption key.

35
New cards

Anti-virus/malware software

Security software which are designed to prevent, detect and remove viruses and other malware.

36
New cards

Manual updates

Users manually prompt for the update to occur.

37
New cards

Symmetric encryption

This is when the encryption and decryption keys are the same.

38
New cards

Data in transit

The data is being sent to two or more authorised users, or moving, from one location to another, for example across the internet or through a private network.

39
New cards

Automatic updates

Some software updates occur automatically. This process is usually completed in real time.

40
New cards

Firewalls

A security device that mitigates against threats by examining data packets. Can be a hard/software - both work in the same way.

41
New cards

Identity theft

When personal details are stolen.

42
New cards

Secure backups

A copy of the data/files that are currently in use.

43
New cards

Identity fraud

When personal details are stolen and used to commit fraud. E.g. Take out a loan in someone else's name.

44
New cards

Usernames and passwords

The username acts as authorisation whilst the password acts as authentication. Without both parts being correct, access will be denied.

45
New cards

Backups

Made regularly and stored away from the digital system, preferably in another building in a secure place.

46
New cards

Computer Misuse Act (CMA)

Relates to illegal access to files and data stored on digital systems.

47
New cards

Data Protection Act (DPA)

Attempts to control how personal data and information are used by organisations and the UK Government, giving data subjects control of their personal data.

48
New cards

Data sanitation

The process of deliberately, permanently and irreversibly removing or destroying the data stored on a storage device to make the data unrecoverable.

49
New cards

Data erasure

Software used to overwrite the data on a storage device.

50
New cards

Magnetic wipe

When the magnetic field part of a storage device is removed, making all the data stored on the storage device unreadable.

51
New cards

Physical destruction

Physical destruction of a storage device is the most secure method, thoroughly destroying the device so that the data cannot be retrieved.

52
New cards

Copyright, Designs and Patents Act (CD&PA)

Establishes copyright to protect the creative work of individuals or businesses and aims to protect intellectual property.

53
New cards

Health and Safety (H&S) at Work Act

Provides guidance to employers and employees about health and safety at work, including the Health and Safety DSE Regulations for those working with digital systems.

54
New cards

Freedom of Information Act (FoI)

Deals with access to official information and the right of individuals to find out any information on any topic from any public authority.

55
New cards

Main principles of DPA

1. Used fairly, lawfully and transparently; 2. Used for specified, explicit purposes; 3. Used in a way that is adequate, relevant and limited to only what is necessary; 4. Accurate and, where necessary, kept up to date; 5. Kept for no longer than is necessary; 6. Handled in a way that ensures appropriate security.

56
New cards

Main parts to CMA

1. Unauthorised access to computer material; 2. Unauthorised access with intent to commit or facilitate the commission of further offences; 3. Unauthorised acts with intent to impair, or with recklessness as to impairing, operation of a computer; 4. Making, supplying or obtaining any articles for use in a malicious act using a computer; 5. Unauthorised acts causing, or creating risk of, serious damage.

57
New cards

Main tasks of H&S at Work Act

1. Analyse workstations and assess and reduce risks; 2. Plan work so that there are breaks or changes of activity; 3. Arrange and pay for eye tests and glasses (if special ones are needed); 4. Use of software without the relevant license; 5. Provide health and safety training and information.

58
New cards

Methods of physical destruction

Can include: hard drive shredder, steamroller, burning, drill through or hammer on the device.

59
New cards

Illegal activities under CMA

1. Illegal download of video/audio files; 2. Software piracy, either by illegal download or illegal distribution; 3. Theft of intellectual property, for example text/written work, including on websites; 4. Using/downloading images without permission of the copyright holder.