B1 - Threats to Data R

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/11

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 6:09 PM on 4/29/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

12 Terms

1
New cards

5 reasons why systems are attacked

  • fun / challenge → test skills

  • industrial espionage (access other systems for their trade secrets or strategy for competitive advantage)

  • personal attack → vengeful

  • disruption → to stop them functioning normally

  • data / info theft → stealing to sell

2
New cards

8 types of external threats

  • hacking

  • malware

  • denial of service attacks

  • phishing

  • pharming

  • social engineering

  • shoulder surfing

  • man in the middle attack

3
New cards

what is hacking and how to prevent it

gaining unauthorised access to a system (black hat hacker)

  • strong, regularly changed passwords

  • software regularly updates

4
New cards

malware (7) and how to prevent it

software with malicious intent

(virus, worm, botnet, rootkit, Trojan, ransomware, spyware)

  • operating system updates

  • anti malware software

  • firewall

5
New cards

denial pf service attacks and how to protect

clooding a website with so many requests that its unable to respond to requests from authorised users

  • firewall

  • intrusion detection systems

6
New cards

pharming and how to prevent it

redirect traffic for genuine site onto spoof version to get personal information

7
New cards

social engineering and how to prevent it

trick into giving personal info by pretending to be someone trustworthy

8
New cards

phishing how to prevent

spoof email or text to click on link and get details

  • dont click on links

9
New cards

shoulder surfing and how to prevnt

watching. thats it. just watch them.

  • angled away

  • 2fa

10
New cards

man in the middle attacks and how

eavesdropping. intercept unencrypted messages on open wifi and alter data sent and received

  • no public wifi

11
New cards

6 internal threats

  • unintentional disclosure of data → telling ppl you think u can trust

  • intentional stealing / leaking

  • users override security controls → writing down pass, allowing unauthorised

  • use of portable storage devices

  • downloads from internet

  • visiting untrustworthy websites

12
New cards

6 impacts of security breach

  • data loss

  • damage to publiv image

  • financial loss

  • reduction in productivity

  • downtime

  • legal action