idk Flashcards
malware designed to damage destroy or delay service to target systems
Deliberate software attacks
types of deliberates software attacks
Viruses, worms, trojan horses, logic bombs, back/trap door, polymorphic threats, virus/worm hoaxes
Is depends on many interdependent support systems
Internet services, communications irregularities
Deviation in quality of service
Access of protected info by unauthorized individuals
Espionage/ trespass
Expert hacker
Develops software scripts and program exploits
Most dangerous
Forces of nature
Individual lives, storage, transmission, use of information
Disrupts
Acts performed without malicious intent
Human error/ failure
Steals information, demands compensation
Credit card
Information extortion
Can make organizations vulnerable to loss damage or disclosure of information assets
Missing inadequate or incomplete
Website defacing can erode consumer confidence dropping sales organizations net worth
Sabotage or vandalism
more sinister form of hacking
Cyberterrorism
Illegal taking of another’s physical, electronic or intellectual property
theft
Occur when manufacturer distributes equipment containing flaws to users
Technical hardware failure or errors
True or false: some errors are terminal; some are intermittent
True
Purchased software that contains unrevealed faults
Technical software failures or errors
Antiquated/outdated infrastructure can lead to unreliable untrustworthy systems
Technological obsolescence
Execution of viruses, warns, ths
Intent to steal/destroy info
Malicious code
Virus hoax with real virus attached
More devious form of attack
Hoaxes
Gaining access using known/previously unknown/ newly discovered access mechanisms
Backdoor
Attempting to reverse calculate a password
Password crack
Trying every possible combination
Brute force
Most important
Policy
Awareness
Eula
Most difficult
Training
Educate
Education
Not static
Technology
CIA triangle
Confidentiality, integrity, availability
Systems administrators attempt to improve security of their systems
Grassroots effort
Grassroots effort, technical expertise of indiv admins, lacks a number of critical features: participant support organizational staying power
Bottom - up approach
Initiated by upper management and involve development strategy referred to as systems development life cycle
top-down approach
intellectual property rights
patent trademark trade secret copyright