Virus
Virus - is a program that, when executed, replicates itself by modifying other computer programs.
The core function of Keychain -
Keep track of passwords so users don't have to memorise them
What is included in the countermeasures
Countermeasures:application firewalls, encryption programs, patch management, and biometric authentication systems.
Is a type of cyberattack conducted by a threat actor (or cyber spy) who accesses, steals, or exposes classified data with malicious intent, in order to gain an economic, political, or competitive advantage in a corporate or government setting
Espionage
1)A device or any set of computer instructions intended to unlawfully damage a system acting as a critical infrastructure, its information, the data or programs therein contained or thereto relevant, or even intended to facilitate the interruption, total or artial, or alteration of its o erations.
2)Cyber weapon could be defined as a computer code that is used or designed to be used with the aim of threatening or causing physical, functional, or mental harm to structures, s stems, or livin bein s.
1)Security expert
2)Legal expert
Adware
Keylogger
Advaware - is software that displays unwanted pop-up ads which can appear on your computer
Keylogger - is a program that records every keystroke made by a computer user to gain fraudulent access to passwords.
You start your computer and then an advertisement pops up on the entire screen, after it closes, another advertisement pops up. What kind of virus is this?
Security in IT
Security in information technology (IT) is the defense of digital information and IT assets against internal and external, malicious and accidental threats. This defense includes detection, prevention and response to threats through the use of security policies, software tools and IT services
An effort to control information in whatever form it takes, and influence public opinion. It is a form of psychological warfare, except it uses social media, fake news websites and other digital means.
Propaganda attacks
What is cyberspace?
Information and Communication Technology has created a virtual world with no boundaries(cyberspace).
Rootkit
Ransomware
Rootkit - is a program that masks its or other software existence.
Ransomware - is malware that prevents or limits users from accessing their system.
You received a phone call from an unknown number, the person introduced himself as a friend of your relative. He says that he needs money for the operation your relative. What the name of this hack?
Vishing
Physical security
Physical security is the protection of personal, hardware, software, networks and data from physical actions, intrusions, and other events that could damage an organisation. This includes natural disasters, fire, theft and terrorism, among others. Physical security for enterprises often includes employee access control to the office buildings as well as specific locations, such as data centres
Is an attack meant to shut down a machine or network, making it inaccessible to its intended users.Thats attacks accomplish this by flooding the target with traffic, or sending it information that triggers a crash.
Denial of services(DoS) attacks
What illegal activities do people commit in cyberspace?
Espionage, theft of technology, financial frauds and so on.
Spyware
DDoS Attack virus(Botnet)
Spyware - is any software that installs itself on your computer and starts covertly monitoring your online behaviour without your knowledge or permission. It relays this data to other parties.
DDoS Attack virus - A DDoS virus turns the victim’s device into a zombie participating in a larger botnet.
You are sitting in a coffee shop and drinking coffee, while working on your project and chatting on social networks. Have a carefree time, but then your account was hacked. How did it happen?
Sniffing
Application security
Application security — the protection of applications from threats that seek to manipulate application and access, steal, modify or delete data.
DELIBERATE actions to harm an organization's physical or virtual infrastructure, including noncompliance with maintenance or IT procedures, contaminating clean spaces, physically damaging facilities, or deleting code to prevent regular operations.
Sabotage
What parameters can cyber weapons be classified by?
Precision, intrusion, visibility, ease of implementation
Trojan
Worm
Bot
Trojan - is a program that, when executed, replicates itself by modifying other computer programs
Worm - can replicate itself without any human interaction, it can be transmitted via software vulnerabilities or could arrive as attachments in spam emails or instant messages
Bot - is a type of malware that is disguised as a legitimate program; it seems to perform one action but actually does something else.
You are a frivolous person who sits at home and enjoys homemade cakes and drinks coffee. But suddenly it’s time for work, you leisurely go to the computer, but then there’s trouble, your accounts have been hacked. You understand perfectly well that you didn’t download anything, didn’t follow any links, didn’t surf on private networks and didn’t show your password to anyone, your computer is completely clean from hacker attacks. But how can this be?
A dictionary attack
or
The brute force attack
Insosec
Information security encompasses a broad set of strategies for managing the process, tools and policies that aim to prevent, detect and respond to assaults to both digital and non-digital information assets. Infosec includes: application security, the protection of applications from threats that seek to manipulate application and access, steal, modify or delete data.Also infosec includes applicatons security and countermeasures
What is the danger of electrical power grid attacks?
Surprise attacks?
Electical - Cyber attackers also have the ability to access power system communication networks and connect to remote access points at a power system infrastructure. This can lead to serious and harmful consequences. As a result, cyber security of smart grids has been recognized as a critical issue
Surprise attacks - The point is to carry out a massive attack that the enemy isn't expecting, enabling the attacker to weaken their defenses
What economic spheres does cyber weapon strike most often?
What are the most dangerous effects of the use of cyber weapons?
Likely targets of cyber weapons are electronic national defence systems, hospitals, water supplies, fully-automated transportation control systems, air traffic controls and etc.
Difficulty to predict its diffusion since cyber space has no boundaries.This means that cyber weapons could hit in unpredictable ways other systems and networks that are not considered targets. In extreme cases, there is a possibility that it attacks the systems of host nation in a sort of "boomerang effect"