Cybersecurity

Subdecks (1)

Cards (27)

  • What is Data?
    Raw facts and figures
  • When is information created?

    When data has been processed and becomes meaningful.
  • Data can be used to create useful information and build a customer profile.
  • Data might be collected like:
    • Personal info: name, DoB
    • Content: images, status updates
    • User behaviour: what pages you visit / like
    • Data on others: names of friends, phone numbers
  • What is Social Engineering?
    A set of methods used by cyber criminals to deceive individuals into handing over info.
  • What is Shouldering?
    It’s designed to steal passwords by watching the victim enter sensitive info.
  • What is are Name Generator Attacks?
    It asks for info through an app, social media post or quiz to collect personal details.
  • What is Phishing?
    A victim receives an email disguised to look as if it came from a reputable source.
  • Some phishing examples:
    • email usually provides a link
    • unexpected email with a request for info
    • suspicious hyperlink and spelling / grammar mistakes
  • What is Blagging?
    When someone tricks you in person or on the phone by pretending to be someone else to get your personal info or money.
  • What is Hacking?
    Gaining unauthorised access to or control of a computer system.
  • What is a Denial of Service attack (DoS)?

    A criminal makes a network or website unavailable by sending lots of requests to overload it.
  • What is a Distributed Denial of Service Attack (DDoS)? 

    Same concept as a DoS attack but with more computers at the same time.
  • What is a Brute force attack?
    A form of attack that makes multiple attempts to discover something.
  • Computer Misuse Act 1990:
    • S1: unauthorised access to computer material
    • S2: unauthorised access with intent to commit or facilitate the commission of other offences
    • S3: unauthorised access to impair
  • What is Malware?
    A software designed to gain access.
  • What are Viruses?
    Self-replicating software, modifying code.
  • What are Worms?
    They replicate and spread through network.
  • What is Ransomeware?
    It copies itself, locks your computer by encrypting files and then ask for money to unlock them.
  • Worms spread of their own, while Viruses need to attack to something.
  • What is Trojan?
    It looks helpful but secretly does harmful things.
  • What is Spyware?
    It’s unwanted software that watches what you do and collects your info without permisson.
  • What is Adware?
    It makes your device show unwanted ads or pop-ups when you’re online.