practice of defending digital devices from malicious attacks
whats denial of service
attempts to make a digital system unavailable to users by flooding with network traffic
define hacking
finding a weakness in a establisheddigital system and exploiting them
what are the three types of hacking
black hat
grey hat
white hat
whats black hat hacking
hacking with malicious intent
define grey hat hacking
hacking into a digital system for fun/to troll
whats white hat hacking
given permission to hack to find any weakness in system
what is malware
malicious software thats installed on a digital system and collects info
what are the types of malware
adware
botnet
ransomware
spyware
trojan horse
worm
virus
define adware
generates revenue - known as advertising such as pop ups
whats botnet
attempts to take control of digital system
whats ransomware
holds computer system captive and demands a fee to release
define spyware
collects data and is usually hidden from user
whats trojan horse
designed to give full control of infected digital system
whats virus
attempts to make computer systemunreliable, replicates itself and spreads
whats worm
replicates itself and can use a network to spread
define social engineering
art of manipulating people so confidential information can be found out
what are the types of social engineering
baiting
phishing
pretexting
quid pro quo
scareware
shoulder surfing
whats baiting
tries to get victims to give cybercriminals the info they need
similar to phishing
criminals promise of goods to get information
whats phishing
tries to get users to inputcard/security/log in details into a fakewebsite, targetsbank/building society
whats pretexting
cybercriminal lies to get data/information, usually a scam where criminal pretends to need information to confirmidentity
whats quid pro quo
tries to disableanti-virus software so software updates, promise of service
whats scareware
tries to scare people into buying/downloadingsoftware, usually popup to convince user theres a problem
whats shoulder surfing
aims to steal data/information, when persons confidential information is seen because attackerstands close and see's their information
define data destruction
data is destroyed by attacker and no longer exists
define data manipulation
data is edited to meet the needs of attacker, may result to false news published
define data modification
changes data to meet the needs of attacker eg amount of money in a bank account
define data theft
data is stolen from a digital system, with the aim of compromisingprivacy
define identity theft
personal data is stolen during an attack
what are impacts on organisations
time delay in restoring data
reputation is negatively affected and no longer seen as trustworthy
define the prevention methods
logical
physical
secure destruction of data
what are the physical prevention measures
biometrics devices
firewalls
keypads
radio frequency identification (RFID)
secure backups
define biometrics devices
owner stores biometriccharacteristics in the security settings
define keypads
type of lock where correct code must be input before lock opens
define RFID
access badge is tapped against lock then it opens
what are secure backups
copy of data/files that are currently in use, made regularly and stored away
what are the logical prevention measures
access rights/permissions
usernames and passwords
anti-virus and anti-malware software
two-factorauthentication
encryption
define access rights and permissions
set on files/folders
authentication and username/password can be used to do this
define username and passwords
two part logicalprevention measures
username is authorisation
password is authentication
define two-factorauthentication
user inputs username/password which is submitted and checked, when details are recognised, a token code is sent to either email address/mobile phonelinked to the username/password