LOB

Cards (10)

  • external threats
    • shoulder surfing
    • phising
    • pharming
    • denial - of - service attack
    • malware
  • internal threats
    • visiting untrustworthy websites
    • downloads from the internet
    • unintended disclosure of data
    • use of portable storage devices
    • stealing / leaking of information
  • encryption
    • data is scrambled by an algorithm
    • sent with a key
    • cannot be intercepted or understood by hackers
    • data is unscrambled by the key when it reaches the intended destination
  • impact of a security breach
    • data loss
    • damage to public image / untrustworthy
    • financial loss
    • reduced productivity
    • legal action
  • why are systems attacked
    • fun / challenge
    • industrial espionage
    • financial gain
    • personal attack
  • types of hackers
    • white hat - hired by companies to test security systems
    • grey hat - hack without consent with no criminal intent
    • black hat - malicious intent
  • after an attack
    • investigate
    • respond
    • manage
  • anti-virus
    • locates and detects viruses on the computer
    • seperates them and kills them so they cannot harm a computer system
  • user access restrictions
    • passwords
    • bio metrics
    • physical security measures - key cards / cameras / locks
    • two-factor authentication
  • firewall
    • blocks out unwanted tragic
    • filters out threats to the computer system