Understand the common types of threat to ICT systems and data

Descrição

Physical threats to ICT systems and data including hardware damage, loss and theft e.g.
Tim Bowater
FlashCards por Tim Bowater, atualizado more than 1 year ago
Tim Bowater
Criado por Tim Bowater mais de 6 anos atrás
2825
0

Resumo de Recurso

Questão Responda
Accidental damage to hardware or equipment Spillage of liquid Loss of power - uninterruptible power supply Impact damage Unforeseen events - floods Incorrect connections - bent pins
Deliberate damage to hardware or equipment Disgruntled employee Competitor damage (damage their product, damage their reputation, damage their infrastructure) Theft of equipment
List ways how to cause to competitor damage Social media Bad reviews of their product/service Disrupting the company’s infrastructure (supply or delivery) Leaking data or data link Making their brand/service unreliable (causing delays, DDOS attack or not completing orders jobs/service etc) Adverts – e.g. windows vs mac, smear campaign
Inadequate physical security USB stick left outside containing a worm which an employee finds and uses at a company. Tail gating Entry locks – key locks, biometrics, keypad Hardware locks – pad locks, chain locks
Loss or theft due to size or portability of devices and the consequences? Laptop – magnetic/solid state - lo-jack used to track phones/tablet/laptops - loss of data, cost to company External/portable hard drive – loss of data, cost to company USB stick/pen – easily corrupted - loss of data, cost to company
Identify and describe the consequences of common types of electronic threats to ICT systems and data High amounts of Electrostatic discharge (ESD) if it is too dry, Too wet and rust 50%-60% Unauthorised access to data – a hacker stealing data Denial of service attack – simplest way is ping, sending many pings. Phishing – vishing, spear and whale. Weak or inadequate passwords Email attachments -e.g. Trojan.exe in an email. “Drive by download” attack – A site automatically downloads a virus/malicious software to your computer. Failure to install OS or Program Security updates. Identity theft – Stealing your identity and taking control of your online accounts.
Identify and describe the consequences of security vulnerabilities associated with remote access technologies, including wireless Home Working – Weak security on the home network, infected device causing the work computer to become infected. Remote or web email access – network infrastructure/email server becomes compromised. Wireless Connections – Wi-Fi insecure password or using a less secure encryption (WEP) Mobile Phones – cloning of sims and using an antenna lets the hacker listen in. Bluetooth – Bluesnarfing and bluejacking. Web Page Hijack – Redirecting homepage to a malicious site.

Semelhante

CCNA Security Final Exam
Maikel Degrande
Security Guard Training
Summit College
ISACA CISM Exam Glossary
Fred Jones
Security
annelieserainey
Securities Regulation
harpratap_singh
2W151 Volume 1: Safety and Security - Quiz 7
Joseph Whilden J
Security Quiz Review
Rylan Blah
Security Policies
indysingh7285
2W151 Volume 1: Safety and Security - Quiz 6
Joseph Whilden J
Security (2)
Daniel Freedman
Certified Security Compliance Specialist
jnkdmls