ACCA BT Syllabus C. Business Functions, Regulation and Technology - Cyber Attacks and Protection - Notes 5 / 5
Cyber Attacks
Phishing
The cyber-attacker sends emails to the victim (which look like they're from someone else eg a bank) - the victim replies with their confidential info
Pharming
The cyber-attacker redirects visitors from to a bogus website. The intention is to collect data in order to commit fraud
and is similar to phishing.
Hacking
The cyber—attacker gains unauthorised access to an organisation's computer system
Denial of Service
The cyber-attacker prevents people from accessing the organisation's website.
Botnets (large numbers of individual computers which have been taken over without the user knowing) are instructed to overwhelm the organisation's website and cause it to crash.
Webcam Control
The cyber-attacker uses software to take control of the user’s webcam.
File hijacker/ransomware
The cyber-attacker gains access to the user's system to hijack their files and hold them to ransom
Keylogging
The cyber—attacker plants software onto the user’s computer to record what the user types onto their keyboard.
Ad clicker
The cyber-attacker directs the victim’s computer to a bogus website by encouraging them to click on a
specific link contained in online advertising
Protection against Cyber - Attacks
Access Control
These are physical and network procedures to restrict access to a system.
Firewalls and Gateways
These intercept data being transmitted in and out of a system.
Malware and virus protection
These prevent installation of suspicious programs
Patches
These ensure that the latest software updates are installed on the system when available.
Secure Configuration
The organisation should have a policy which states that systems should be set up with cyber security as a priority.