Chapter 1 Flashcards
threat environment
consists of the types of attackers and attacks that companies face
confidentiality
people cannot read sensitive information, either while its on a computer or traveling across a network
integrity
attackers can’t change/destroy info, either while on a computer or traveling across a network
availability
the people who are authorized to use info aren’t prevented from doing so
compromises
successful attacks
countermeasures
tools used to thwart attacks
3 types of countermeasures
preventative
detective
corrective
SQL injection
an attack that involves sending modified SQL statements to a web application that will modify a database
unexpected input
what attackers can send through their web browser which can enable them to read from, write to, and even delete entire databases
employees/ex-employees are dangerous because
they have knowledge of internal systems, permission to access systems, how to avoid detection, and are trusted
employee sabotage
destruction of hardware, software, or data
employee hacking
intentionally accessing a computer resource without authorization or in excess of authorization
employee financial theft
misappropriation of assets; theft of money
employee theft of intellectual property
copyright and patents
employee extortion
perpetrator tries to obtain money or other goods by threatening to take actions that would be against the victim’s interest
carelessness
loss or theft of computers or data media containing sensitive information
malware
a generic name for any evil software
virus
program that attaches itself to legitimate programs on the victim’s machine
worms
full programs that do not attach themselves to other programs
blended threats
malware propagates in several ways– like worms, viruses, etc.
payloads
pieces of code that do damage
nonmobile malware
must be placed on the user’s computer through one of a growing number of attack techniques
trojan horse
program that replaces an existing system file, taking its name
remote access trojans
remotely control the victim’s PC
downloaders
small trojan horses that download the larger trojan horses after the downloader is installed
spyware
programs that gather info about you and make it available to the adversary
rootkits
take control of the super user account, difficult to detect
mobile code
executable code on a webpage (automatically when the webpage is downloaded)
social engineering
attempting to trick users into doing something that goes against security policies
traditional hackers
motivated by the thrill, validation of skills, and sense of power
first thing to do in a hack
reconnaissance probes
reconnaissance probes
IP address scans to identify possible victims and the port scans to learn which services are open on each potential victim host
the exploit of a hack
this is the specific hack method the attacker is using
chain of attack computers
the attacker attacks through a chain of victim computers
social engineering focuses on what kind of weakness?
human weakness
Denial-of-Service (DoS) attack
make a server or entire network unavailable to its users and typically sends a flood of attack messages to the victim
expert attackers create hacker _____ to automate some of their work
scripts
Script ______ use scripts to make attacks
kiddies
today most attackers are career criminals with
traditional criminal motives
fraud
the attacker deceives the victim into doing something against the victim’s financial self-interst
extortion
threaten a DoS attack or threaten to release stolen info unless the victim pays the attacker
identity theft
stealing enough info to represent a victim in large transactions
corporate identity theft
stealing the identity of an entire corporation
commercial espionage
attacks on confidentiality and public info gathering
DoS attacks by competitors
attacks of availability
attacks by national govts are
cyberwar
attacks by organized terrorists are
cyberterror
cyberwar
computer-based attacks by national govts
cyberterror
attacks by terrorists or terrorist groups that use the internet to attack IT resources directly