Chapter 3: Threat Factors - Computers as Targets Flashcards
What are the 3 Phases of Convergence?
1) Separate the people
2) Leverage technology
3) Replace people
Explain “Separate People” as it r/t Convergence?
- Aka sneakerware because people had to physically take a floppy disk or other external hard drive & walk to a computer to transfer a malware onto the computer
- First Macintosh virus, Elk Cloner, was part of a video game for computers inserted via a floppy disk
Explain “Leverage Technology” as it r/t Convergence?
- Fraudsters developed the first email born viruses, such as the ILOVEYOU & the Melissa virus, which spread via email attachments
- Code Red attacked Microsoft computer systems & spread to other systems by using HTTP requests
Explain “Replace People” as it r/t Convergence?
People do not have to be physically present in one country to spy out information on computers in other country; in stead, they can infiltrate computers & steal information by using computer programs such as Trojan horses
What are the main targets in Information Technology?
1) Software
2) Hardware
3) Network
What are examples of Attacks on Software?
- Infected download links of software or software updates
- Malicious apps
- Drive-by downloads
What are examples of Devices for Software?
o Computers
o Computer networks
o Smart devices
What are examples of Countermeasures for Software?
o Anti-virus software
o Security patches
o Data backup
o Software screening
What are examples of Attacks on Hardware?
- Manufacturing backdoors
- Backdoor creation
- Access to protected memory
- Hardware modification
- Inducing faults
- Counterfeiting products
What are examples of Devices for Hardware?
o Access control systems
o Network appliances
o Industrial control systems
o Surveillance systems
o Components of communication infrastructure
What are examples of Countermeasures for Hardware?
o Tightly control production
o Use detection measures to discover compromised hardware
What are examples of Attacks on Network?
- Denial-of-service attacks
- The Man in the Middle
- Browser
- Brute Force
- SSL
- Scan
- Domain Name Servers
- Backdoor
What are examples of Devices for Networks?
o Computers
o Modem
o Router
What are examples of Countermeasures for Networks?
o Network-based mitigation
o Host-based mitigation
o Proactive measures
What are the 3 main issues Cybersecurity is concerned with?
1) Confidentiality
2) Integrity
3) Availability