ICT- Cyber Security

?
Cyber Security Incidents
Any malicious act or suspicious that compromises the Electronic Security Perimeter or Physical Security Perimeter
1 of 7
Computer Hacking
Being able to modify computer hardware and software to enable the hacker to achieve a goal which was not in the creator's original purpose.
2 of 7
Disclosure of Government Information
Able to retrieve classified data but can not release it due to Official Secrets Act, due to it is in the interests of the country's security
3 of 7
Impairing the operational of digital systems
Computers and networks require certain elements operate, such as network bandwidth, memory space, CPU time.
4 of 7
Denial of Service (DoS)
Any type of attack in which the attackers attempt to stop the users from accessing the service.
5 of 7
Malware
Software which damages systems, causes instability such as charging settings
6 of 7
Identity Theft
Criminals that steal someones identity so they can commit crimes in their name and use their resources such as bank accounts.
7 of 7

Other cards in this set

Card 2

Front

Computer Hacking

Back

Being able to modify computer hardware and software to enable the hacker to achieve a goal which was not in the creator's original purpose.

Card 3

Front

Disclosure of Government Information

Back

Preview of the front of card 3

Card 4

Front

Impairing the operational of digital systems

Back

Preview of the front of card 4

Card 5

Front

Denial of Service (DoS)

Back

Preview of the front of card 5
View more cards

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Cyber Security resources »