security
Vulnerability - Answer Flaws or issues that result in the weakness in the security of a
system.
System attack - Answer E.g. DoS, botnet, social engineering.
Physical - Answer E.g. theft of portable equipment such as laptops, tablets and portable
drives.
Environmental - Answer E.g. floods, fire and earthquakes.
Accidental - Answer Unintentional events e.g. spilling liquid on a computer, dropping an
item responding to a hoax email, deleting data by mistake.
Intentional - Answer Criminal activities intent on harming computer systems e.g.
hacking, social engineering, DoS, botnet.
Cyber enabled crime - Answer E.g. fraud, theft and bullying using IT
Cyber dependent crime - Answer Crime that can only be carried out using computer
networks e.g. spreading malware, hacking and DoS.
Money laundering - Answer The process by which criminals hide the origins of their
crime by transferring money through different bank accounts and countries.
Data mining - Answer The use of sophisticated tools to identify trends and patterns in
large data stores.
State sponsored - Answer Countries spying on each other to obtains information such
as military campaigns, nuclear facilities, government policies and to spread fake news.