Save
Computer science internal threats
Save
Share
Learn
Content
Leaderboard
Share
Learn
Created by
Yahya Haidari
Visit profile
Cards (38)
What is the intent of understanding internal threats within an organization?
To understand
internal threats
to digital systems and
data security.
View source
What is the purpose of analyzing different types of internal threats?
To understand the
impact
of
security breaches.
View source
What should students recall regarding internal threats?
Students should recall the different types of
internal threats
and the consequences of
security breaches.
View source
What are some potential threats to a school's IT systems and data?
Threats can come from teachers, students, admin, support staff, and
outside
the school.
View source
What is malware and what are two types of examples?
Malware
is malicious software designed to disrupt, damage, or gain unauthorized access to
computer systems.
Examples:
Viruses
,
Ransomware.
View source
How do viruses and ransomware disrupt a computer system?
Viruses
replicate
and spread, while ransomware encrypts files and demands
payment
for access.
View source
What is a rootkit designed to do?
A rootkit is designed to gain
unauthorized
access to a computer and
hide
its presence.
View source
What are the steps of a DDOS/DOS attack and its impact on a computer system?
Steps of a DDOS/DOS attack:
Attackers
flood
the target with
traffic.
The system becomes
overwhelmed
and
unavailable.
Legitimate
users cannot access the system.
Impact:
Service
disruption.
Financial
loss.
View source
What are two tricks used for social engineering?
Phishing
and
pretexting.
View source
What is a "Man In The Middle" attack?
A "Man In The Middle" attack involves an attacker
intercepting communication
between two parties.
View source
Give an example of where a "Man In The Middle" attack might be used.
In
unsecured
Wi-Fi networks where attackers
intercept
data between users and the network.
View source
What is unintentional disclosure of data?
It occurs when too much or confidential
information
is given to an
employee
or customer.
View source
How can unintentional disclosure of data happen?
It can happen through leaving data on paper or
removable
media in
unsecured
locations.
View source
What should companies do with sensitive or confidential documents?
They should securely
dispose
of them to prevent
unauthorized
access.
View source
What is dumpster diving?
It is when attackers go through
bins
to find
data.
View source
What happened in the Dyson corporate spy case?
In 2012, Dyson accused engineer
Yong Pang
of
industrial espionage.
Pang allegedly shared Dyson's ideas with
Bosch
and a
Chinese motor developer.
View source
How do companies try to reduce corporate espionage?
Implementing strict
access controls.
Conducting regular
security audits.
Training employees on
security protocols.
View source
What did Edward Snowden do in 2012?
Snowden downloaded over
1 million
documents from the CIA and Department of
Defence.
He revealed
secret government spying
programs.
View source
What charges does Edward Snowden face?
He faces charges of theft of
government
property and
espionage.
View source
What are two ways the leak by Edward Snowden could have been limited?
Implementing
stricter access controls
and
monitoring data downloads.
View source
What are the four categories of security controls?
Physical
– fences, gates, locks
Technical
– firewalls, settings, antivirus
Procedural
– incident processes
Legal
– laws
View source
Name one further example for each category of security controls.
Physical
: Security cameras; Technical: Intrusion detection systems;
Procedural
: Security training; Legal: GDPR compliance.
View source
How do portable storage devices pose a risk?
They allow people to
steal
large amounts of data
quickly.
They can be
lost
or
stolen
easily.
View source
How can organizations prevent data theft via portable storage devices?
By
disabling access
to USB ports and
logging file downloads.
View source
What are three points that show a website is trustworthy?
Secure HTTPS connection
, clear contact information, and
positive user reviews.
View source
What are the financial impacts of a cyber attack?
Direct
financial
loss from
theft.
Costs associated with
recovery
and
repairs.
Potential loss of business due to
reputational
damage.
View source
How can a cyber attack damage a company's public image?
By causing loss of
trust
when
personal
data is stolen or systems are compromised.
View source
What incident occurred with Sony in 2005?
Sony
installed software on CDs that created security vulnerabilities on
computers.
View source
Name three examples of information a company could lose due to data loss.
Customer data,
financial
records, and
intellectual
property.
View source
What else could cause data to be lost besides accidental deletion?
Hardware
failure, cyber attacks, or natural
disasters.
View source
What needs to be in place to recover data?
Regular
backups and a
disaster
recovery plan.
View source
What happened in the Dixons Carphone data breach?
In
2018
, information from around
10
million customers was breached.
Data included names,
addresses
, email addresses, and
payment card details.
View source
What are the consequences of cyber attacks on productivity?
They require
time
to remove
malware
, repair damage, and investigate problems, reducing productivity.
View source
What does the Computer Misuse Act (1990) prevent?
Creation of
malware
including viruses.
Gaining
unauthorized
access to a computer.
Modifying
or
deleting
computer software or data.
View source
What does the Data Protection Act (2018) require?
Prevents
unnecessary
processing or storing of data.
Requires greater
consent
to process or store personal data.
Mandates
notification of data breaches.
View source
What could be the implications if a rootkit takes control of a company's
systems
?
It could lead to
data breaches
, loss of sensitive information, and
operational disruptions.
View source
What threat does a bank employee create by forgetting to lock their computer?
Unauthorized access
to
sensitive information.
View source
What are two impacts resulting from a bank employee forgetting to lock their computer?
Data
breaches and potential
financial
loss.
View source
See similar decks
AQA GCSE Computer Science
2308 cards
OCR GCSE Computer Science
1937 cards
Edexcel GCSE Computer Science
2949 cards
AP Computer Science Principles
1196 cards
AP Computer Science A
1898 cards
OCR A-Level Computer Science
2091 cards
AQA A-Level Environmental Science
2441 cards
AQA A-Level Computer Science
5135 cards
1.4.1 Threats to Computer Systems and Networks
OCR GCSE Computer Science > 1.4 Network Security
33 cards
1.6.2 Legislation Relevant to Computer Science
OCR GCSE Computer Science > 1.6 Ethical, Legal, Cultural and Environmental Impacts of Digital Technology
39 cards
Topic 3: Computers
Edexcel GCSE Computer Science
454 cards
3.5.6 The Internet
AQA GCSE Computer Science > 3.5 Fundamentals of computer networks
125 cards
3.7.6 Analysing the external environment to assess opportunities and threats: social and technological
AQA A-Level Business > 3.7 Analysing the strategic position of a business (A-level only)
94 cards
2.1.1 Internal and External Finance
Edexcel A-Level Business > Theme 2: Managing Business Activities > 2.1 Raising Finance
243 cards
9.4.1 Threats
AQA A-Level Computer Science > 9.0 Fundamentals of communication and networking > 9.4 Network security
77 cards
3.6.1 Cyber security threats
AQA GCSE Computer Science > 3.6 Cyber security
40 cards
6.1 Stimuli, both internal and external, are detected and lead to a response
AQA A-Level Biology > 6. Organisms Respond to Changes in Their Internal and External Environments
150 cards
3.4 Computer systems
AQA GCSE Computer Science
208 cards
Understanding forms of attack
OCR GCSE Computer Science > 1.4 Network Security > 1.4.1 Threats to Computer Systems and Networks
33 cards
6. Organisms Respond to Changes in Their Internal and External Environments
AQA A-Level Biology
608 cards
3.1 Hardware and Software Components
Edexcel GCSE Computer Science > Topic 3: Computers
310 cards