Chapter 1 Flashcards
threat environment
consists of the types of attackers and attacks that companies face
confidentiality
people cannot read sensitive information, either while its on a computer or traveling across a network
integrity
attackers can’t change/destroy info, either while on a computer or traveling across a network
availability
the people who are authorized to use info aren’t prevented from doing so
compromises
successful attacks
countermeasures
tools used to thwart attacks
3 types of countermeasures
preventative
detective
corrective
SQL injection
an attack that involves sending modified SQL statements to a web application that will modify a database
unexpected input
what attackers can send through their web browser which can enable them to read from, write to, and even delete entire databases
employees/ex-employees are dangerous because
they have knowledge of internal systems, permission to access systems, how to avoid detection, and are trusted
employee sabotage
destruction of hardware, software, or data
employee hacking
intentionally accessing a computer resource without authorization or in excess of authorization
employee financial theft
misappropriation of assets; theft of money
employee theft of intellectual property
copyright and patents
employee extortion
perpetrator tries to obtain money or other goods by threatening to take actions that would be against the victim’s interest
carelessness
loss or theft of computers or data media containing sensitive information
malware
a generic name for any evil software
virus
program that attaches itself to legitimate programs on the victim’s machine
worms
full programs that do not attach themselves to other programs