chap 1 part 2 Flashcards
intellectual property (IP)?
information owned by a company and protected by law (copyrights, etc.)
trade secrets?
company plans, customer lists, price lists, etc.
malware?
evil software: computer virus, worms, trojans, RATS (remote access Trojans) spam, etc.
viruses?= work how/?
spread through email by attaching themselves to other legitimate programs such as emails, text, etc.
worms?
full programs do not attach to other programs. uses security flaw in computers and then uses Direct Propagation to spread on own between all connected computers.
blended threats?
malware propagates via compromised webpages containing mobile code, viruses, etc.
payloads?
pieces of code that do damage (malicious payload = heavy damage) goes into effect after certain parameters are met. implemented via worms/ viruses.
blended threats?
malware propagates via compromised webpages containing mobile code/ viruses.
direct propagation worm is what?
a worm that takes advantage of a computers security flaw and self propagates to all connected computers. everything can be infected in 10 minutes. the mere self propagation can cause networks to crash due to the bandwidth usage.
mobile malware?
spreads via email attachments, (virus) self propagating worms or blended threats.
non-mobile malware?
trojan horses/ root kits. placed by hacker on a computer, by a virus. part of payload, social engineering (tricked into downloading). or when webpages are downloaded.
Trojan horse?
a program that deletes a system file then re-names itself after said file.
Remote access Trojans?
hidden Trojan that allows a computer to be controlled remotely for malicious use.
spyware?
cookies, key loggers, password stealing software. data mining. (Trojan horse programs)
rootkit?
a set of software tools that enable an unauthorized user to gain control of a computer system without being detected. (hides from the root or admin)
down loaders?
small Trojan that is downloaded then allows larger Trojan horse to be installed
root accounts?
administrator account on unix computers
spyware (password stealing)
logs you out of a website/ database then asks for log in information that is sent to the attacker. (can look like legit website)
data mining software?
Trojan that looks for password and username or other personal information on your hard drive. information is sent to attacker.
spear phishing?
spam attacks aimed at individuals or groups.
phishing?
spam attacks that look like authentic emails.
mobile code?
executable code on a web-page (java, etc.) if pc has security vulnerability then code does malicious act.
when are trade secrets protected by law?
only when a company tries to make a reasonable effort to keep them secret through standards in the IT security community.
trade secret espionage?
a competitor company buys or solicits employee trade secret information, hacks servers, intercepts communications etc.