Please enable JavaScript.
Coggle requires JavaScript to display documents.
LO2 - Understand the issues surrounding cyber security (2.3 Motivation for…
LO2 - Understand the issues surrounding cyber security
2.1 Threats to cyber Security
Vulnerabilities :
System attack
Physical
Environmental
Accidental
Intentional
Organised Crime
Cyber-enable crime: fraud, theft and bullying using IT
Cyber-dependent crime
State sponsored
2.2 Types of Attackers
Hacktivist
Cyber criminal
Insider
Script Kiddie
Vulnerability broker
Phishers (cyber -dependent)
Cyber-terrorists
2.3 Motivation for attackers
Political or socially motivated
Financial gain
Espionage
Personal use
Sabotage
Wants the power of hacking without the training involved
Thrill of hacking
Publicity
Identity fraud
Create Havoc
Theft of intellectual property
To instil fear
Righting perceived wrongs
2.4 Targets for cyber security threats
People
Internet shopping
Emails
Social media
Organisations: public, private, third party or non profit
Internal/External hacking
DoS
Botnet
Theft of equipment
Theft of data
Data misuse
Computer misuse
Equipment: particularly mobile devices
Stolen
Left unattended
Used in unsecured areas with unsecured network
Lost
Inadvertently infected
2.5 Impacts of cyber-security
Global problems for individuals, organisations and states
Loss of confidentiality, integrity, availability, data, business, finance, identity, reputation and customer confidence
Disruption of people's lives, business, industry, transport, the media and utilities
Safety
2.6 Other consideration of cyber security
Ethical
Ethical hacking
Organisations monitoring employees
States spying citizens
Legal
Communications Act (2003)
Privacy and electronic communications Regulations (2003)
GDPR (EU)
Computer Misuse Act (1990)
Official Secrets Act (1989)
Operational
Regular testing of systems and networks
Keeping operating systems and software up to date
Monitoring antivirus and anti-malware software
Implementing secure remote access methods
Using firewalls
Training employees
Implementing relevant policies and procedures