LO2

Cards (6)

  • 2.1 Threats to cyber security, i.e.:
    vulnerabilities
    o system attacks
    o physical threats
    o environmental
    • accidental
    • intentional
    organised crime
    state sponsored
  • 2.2 Types of attackers, i.e.:
    hacktivist
    cyber-criminal
    • insider
    script kiddie
    vulnerability broker
    scammers
    phishers
    cyber-terrorists
  • 2.3 Motivation for attackers, i.e.:
    espionage
    • righting perceived wrongs
    publicity
    fraud
    • score settling
    • public good
    • thrill
    • income generation
  • 2.4 Targets for cyber security threats, i.e.:
    • people
    • organisations
    • equipment
    • information
    • methods that can be used during an attack
  • 2.5 Impacts of cyber security incidents, i.e.:
    global problem, individuals, organisations and states
    • loss including confidentiality, integrity, availability, data, finance, business, identity, reputation, customer confidence
    disruption including people’s lives, business, industry, transport, industry, the media, utilities
    • safety including
  • 2.6 Other considerations of cyber security, i.e.:
    ethical
    • legal
    operational
    implications for stakeholders