Created by Tim Bowater
over 6 years ago
|
||
Question | Answer |
Accidental damage to hardware or equipment | Spillage of liquid Loss of power - uninterruptible power supply Impact damage Unforeseen events - floods Incorrect connections - bent pins |
Deliberate damage to hardware or equipment | Disgruntled employee Competitor damage (damage their product, damage their reputation, damage their infrastructure) Theft of equipment |
List ways how to cause to competitor damage | Social media Bad reviews of their product/service Disrupting the company’s infrastructure (supply or delivery) Leaking data or data link Making their brand/service unreliable (causing delays, DDOS attack or not completing orders jobs/service etc) Adverts – e.g. windows vs mac, smear campaign |
Inadequate physical security | USB stick left outside containing a worm which an employee finds and uses at a company. Tail gating Entry locks – key locks, biometrics, keypad Hardware locks – pad locks, chain locks |
Loss or theft due to size or portability of devices and the consequences? | Laptop – magnetic/solid state - lo-jack used to track phones/tablet/laptops - loss of data, cost to company External/portable hard drive – loss of data, cost to company USB stick/pen – easily corrupted - loss of data, cost to company |
Identify and describe the consequences of common types of electronic threats to ICT systems and data | High amounts of Electrostatic discharge (ESD) if it is too dry, Too wet and rust 50%-60% Unauthorised access to data – a hacker stealing data Denial of service attack – simplest way is ping, sending many pings. Phishing – vishing, spear and whale. Weak or inadequate passwords Email attachments -e.g. Trojan.exe in an email. “Drive by download” attack – A site automatically downloads a virus/malicious software to your computer. Failure to install OS or Program Security updates. Identity theft – Stealing your identity and taking control of your online accounts. |
Identify and describe the consequences of security vulnerabilities associated with remote access technologies, including wireless | Home Working – Weak security on the home network, infected device causing the work computer to become infected. Remote or web email access – network infrastructure/email server becomes compromised. Wireless Connections – Wi-Fi insecure password or using a less secure encryption (WEP) Mobile Phones – cloning of sims and using an antenna lets the hacker listen in. Bluetooth – Bluesnarfing and bluejacking. Web Page Hijack – Redirecting homepage to a malicious site. |
Want to create your own Flashcards for free with GoConqr? Learn more.