Chapter 3: Threat Factors - Computers as Targets Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What are the 3 Phases of Convergence?

A

1) Separate the people
2) Leverage technology
3) Replace people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Explain “Separate People” as it r/t Convergence?

A
  • Aka sneakerware because people had to physically take a floppy disk or other external hard drive & walk to a computer to transfer a malware onto the computer
  • First Macintosh virus, Elk Cloner, was part of a video game for computers inserted via a floppy disk
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain “Leverage Technology” as it r/t Convergence?

A
  • Fraudsters developed the first email born viruses, such as the ILOVEYOU & the Melissa virus, which spread via email attachments
  • Code Red attacked Microsoft computer systems & spread to other systems by using HTTP requests
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain “Replace People” as it r/t Convergence?

A

People do not have to be physically present in one country to spy out information on computers in other country; in stead, they can infiltrate computers & steal information by using computer programs such as Trojan horses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the main targets in Information Technology?

A

1) Software
2) Hardware
3) Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are examples of Attacks on Software?

A
  • Infected download links of software or software updates
  • Malicious apps
  • Drive-by downloads
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are examples of Devices for Software?

A

o Computers
o Computer networks
o Smart devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are examples of Countermeasures for Software?

A

o Anti-virus software
o Security patches
o Data backup
o Software screening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are examples of Attacks on Hardware?

A
  • Manufacturing backdoors
  • Backdoor creation
  • Access to protected memory
  • Hardware modification
  • Inducing faults
  • Counterfeiting products
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are examples of Devices for Hardware?

A

o Access control systems
o Network appliances
o Industrial control systems
o Surveillance systems
o Components of communication infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are examples of Countermeasures for Hardware?

A

o Tightly control production
o Use detection measures to discover compromised hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are examples of Attacks on Network?

A
  • Denial-of-service attacks
  • The Man in the Middle
  • Browser
  • Brute Force
  • SSL
  • Scan
  • Domain Name Servers
  • Backdoor
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are examples of Devices for Networks?

A

o Computers
o Modem
o Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are examples of Countermeasures for Networks?

A

o Network-based mitigation
o Host-based mitigation
o Proactive measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the 3 main issues Cybersecurity is concerned with?

A

1) Confidentiality
2) Integrity
3) Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the 3 Threat Clusters?

A

1) Technological
2) Socio-political
3) Human-machine

17
Q

What is the Technological Cluster?

A

Computers are the target of the cybercrime – mainly malware, such as viruses & worms

18
Q

What is the Socio-political Cluster?

A

Includes crimes where computers are used as a tool, such as phishing or identity theft

19
Q

What is the Human-machine Cluster?

A

Focuses on computer infrastructure & vulnerabilities created through our dependence on computers & networks

20
Q

What are the 2 functions that malware fulfills?

A

1) Spreads itself
2) Causes damage

21
Q

How does malware spread itself?

A

Via email attachments embedded in web pages, file sharing, infected CDs or DVDs, or by scanning a computer or network for exploitable vulnerabilities

22
Q

How does malware cause damage?

A
  • Trivial damage – message that pops up on the screen every time the user starts the computer
  • Debilitating – destroying files, taking the computer hostage, stealing data & passwords to facilitate other crimes (identify theft)
  • Other damages: computer as a slave to send spam to other documents, to host illegal data, to attack other computers, or to extort others
23
Q

What are the 5 main reasons for the increase in threats to mobile devices?

A

1) Increase in smartphones
2) Android devices & open-source technology
3) Users store more information on these devices
4) Hardware has become more sophisticated
5) Programming software more similar to PCs

24
Q

What are the 3 main forms of malware?

A

1) Computer viruses
2) Worms
3) Trojan horses

25
Q

What is a Virus?

A

Small software program designed to spread from one computer to another and to interfere with computer operation

26
Q

What are the 3 main types of Viruses?

A

1) Shell viruses
2) Add-on viruses
3) Intrusive viruses

27
Q

What do Shell Viruses do?

A

Form a shell around the original code & the original host program w/ the purpose to take over the functions of the host program

28
Q

What do Add-On Viruses do?

A
  • Attach to the original code, changing the startup information of the program
  • Viral code then executes before the original code, interfering w/ the program that the user attempts to run
29
Q

What do Intrusive Viruses do?

A

Overwrite the original code, which can make the host program dysfunctional

30
Q

What are Advanced Persistent Threats (APT)?

A

Virus -
* Cyber attacks executed by sophisticated & well-resourced adversaries targeting specific information in high-profile companies & governments, usually in a long-term campaign involving different steps

31
Q

What are the 5 risks created by Viruses?

A

1) Disable computers
2) Send spam
3) Provide access to computer & information on the computer
4) Steal personal information
5) Hijack the user’s web browser

32
Q

What is a worm?

A

A self-replicating virus that does not alter files but resides in active memory and duplicates itself