1.6.6

Information Security

Test yourself on Information Security

Test your knowledge with free interactive questions on Seneca — used by over 10 million students.

Data Interception

Data interception is an increasing threat to the security of organisations.

Data as a commodity

Data as a commodity

  • Data is a very valuable commodity.
  • Personal data can be used to impersonate individuals to gain access to their assets.
  • Outsiders can exploit the financial data or trade secrets of organisations to gain a competitive advantage.
Data theft

Data theft

  • Data theft is a serious concern for any organisation.
  • The loss of customers' personal data can result in significant fines.
  • Data theft can happen as part of different methods such as:
    • Insider attacks.
    • Man-in-the-middle attacks.
    • Packet sniffing.
Protection from data theft

Protection from data theft

  • Data interception and theft is best prevented by employing a range of preventative measures such as:
    • Encrypting data.
    • User access levels.
    • Network policies.
    • Educating users.

Methods of Data Interception

There are three main methods of data interception: insider attacks, man-in-the-middle attacks, and packet sniffing.

Insider attacks

Insider attacks

  • An insider attack is where someone with privileged access to information (e.g. an employee) uses their access to steal information from the company, and gives it to others.
  • Attackers often have financial or ethical motivations.
  • The risk of insider attacks can be reduced using:
    • Firewalls.
    • User access levels.
Man-in-the-middle attacks

Man-in-the-middle attacks

  • A man-in-the-middle (MITM) attack is where an attacker will intercept a device's connection to the Internet.
  • This is often done by tricking users into signing into a fake WiFi hotspot.
  • The man-in-the-middle can then see all of the victim's traffic, such as personal information.
  • This is one of the reasons why users should be very careful if they join a public WiFi network.
Packet sniffing

Packet sniffing

  • Packet sniffing is where a hacker will intercept data as it is being transmitted across a network.
  • Sniffing software reads and displays the content of all packets being sent on a network.
  • Packet sniffing is a form of passive attack.
  • One of the best ways to protect against packet sniffing is to use encryption so that packets cannot be decoded.
Jump to other topics
1

Computer Systems

1.1

Data Representation

1.2

Data Transmission

1.3

Hardware

1.4

Software

1.5

The Internet & its Uses

1.6

Cyber Security

1.7

Automated & Emerging Technologies

2

Algorithms, Programming & Logic

Practice questions on Information Security

Can you answer these? Test yourself with free interactive practice on Seneca — used by over 10 million students.

  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
Answer all questions on Information Security

Unlock your full potential with Seneca Premium

  • Unlimited access to 10,000+ open-ended exam questions

  • Mini-mock exams based on your study history

  • Unlock 800+ premium courses & e-books

Get started with Seneca Premium