1/9
Vocabulary flashcards covering key concepts related to the reasons IT systems are attacked and the impacts of security breaches.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Fun/Challenge
Unauthorized access to systems without a goal for financial gain, often for personal achievement or peer recognition.
Industrial Espionage
The act of stealing confidential data from rival businesses or governments to gain competitive advantages.
Financial Gain
Motivation for attacks driven by the intent to directly or indirectly steal money or valuable information.
Personal Attack
Attacks motivated by personal grudges, often involving disgruntled employees or ideological conflicts.
Disruption
Attack aimed at interrupting an organization's services for political, personal, or financial gain.
Data/Information Theft
The act of stealing sensitive data, often leading to identity theft and financial fraud.
Security Breach
An unauthorized access to data that impacts businesses through data loss, financial loss, or damage to public image.
Denial-of-Service Attacks
A malicious attempt to disrupt the normal functioning of a targeted server or service.
Data Protection Act
Legislation that requires personal data to be kept secure, failures can lead to legal action and fines.
Downtime
Periods when a system is unavailable, often due to cyber attacks, affecting business operations.