Hacking

Description

Can also be classed in as computer science
Joseph Stalin
Flashcards by Joseph Stalin, updated more than 1 year ago
Joseph Stalin
Created by Joseph Stalin almost 6 years ago
9
0

Resource summary

Question Answer
Why are systems attacked?
Explain why people hack for fun / challenge Hackers may attack a system for the thrill, adrenaline rush or sense of personal achievement.
Explain industrial espionage Businesses could have their intellectual property, for example designs, business strategies ect. stolen through cyber attacks.
Explain why people hack for financial gain A very simple reason: money. Extorting money from victims of a cyber attack is common due to an increasing number of people using ransomware.
Explain personal attack Some attacks can be personally motivated (most commonly ex-employees holding grudges against their former employees perhaps feeling they were treated unfairly)
What is disruption? Any attack that prevents an organisation from operating normally causes operational chaos, loss of earnings & reputational damage, all of which can have lasting effects.
What is data & information theft? Both have value as something that could be sold to criminal gangs or organisations for financial gain. This is done by stealing customer payment information (debit & credit card details, names, addresses ect.) that is used to purchase goods illegally. Breaches of data and information are a major cause of identity theft.
What is phishing? Phishing is a form of social engineering & a very common form of cyber attack, arriving in a users inbox as a spoof email, pretending to be a legitimate company. The user is typically asked to click a link to visit a website & confirm 'critical information'
What is pharming? Pharming is a cyberattack that uses malware to direct a user to a fake website that requests information.
What is a man-in-the-middle attack? A form of cyberattack where the communication between two devices, for example a user & a web service, is intercepted & possibly tampered with.
Show full summary Hide full summary

Similar

Common Technology Terms
Julio Aldine Branch-HCPL
Project Communications Management
farzanajeffri
Network Protocols
Shannon Anderson-Rush
Abstraction
Shannon Anderson-Rush
Computing
Kwame Oteng-Adusei
HTTPS explained with Carrier Pigeons
Shannon Anderson-Rush
Introduction to the Internet
Shannon Anderson-Rush
Construcción de software
CRHISTIAN SUAREZ
Historical Development of Computer Languages
Shannon Anderson-Rush
Useful String Methods
Shannon Anderson-Rush
Web Designing & Development Full Tutorial
Nandkishor Dhekane