Save
GCSEs
Computing
LOB
Save
Share
Learn
Content
Leaderboard
Share
Learn
Created by
Crystal Jef
Visit profile
Cards (10)
external threats
shoulder surfing
phising
pharming
denial - of - service attack
malware
internal threats
visiting
untrustworthy
websites
downloads from the internet
unintended
disclosure of data
use of
portable
storage devices
stealing
/ leaking of information
encryption
data is scrambled by an
algorithm
sent with a
key
cannot be intercepted or understood by
hackers
data is unscrambled by the key when it reaches the intended
destination
impact of a
security breach
data loss
damage to public image / untrustworthy
financial loss
reduced
productivity
legal action
why are
systems
attacked
fun / challenge
industrial espionage
financial gain
personal attack
types of hackers
white hat
- hired by companies to test security systems
grey hat
- hack without consent with no criminal intent
black hat
- malicious intent
after an
attack
investigate
respond
manage
anti-virus
locates and detects
viruses
on the
computer
seperates them and kills them so they cannot harm a computer system
user access restrictions
passwords
bio metrics
physical security measures -
key cards
/ cameras / locks
two-factor authentication
firewall
blocks out
unwanted
tragic
filters out threats to the computer system