Module 2 Flashcards
Describe a few Threats to information security
software attacks,
intellectual property theft,
identity theft,
equipment theft,
information theft,
sabotage, and
information extortion
Define the term “Threat”
includes anything that has the potential to breach security, harm one or more valuable objects, or negatively alter, erase, or otherwise affect them
define/describe the term “attack”
An attack is the exploitation of a vulnerability by a threat agent.
an attack is any intentional attempt to exploit a vulnerability of an organisation’s security infrastructure to cause damage, loss, or disclosure of assets.
✓ An attack can also be viewed as any violation or failure to adhere to an organisation’s security policy.
define the term “breach”
A breach is the occurrence of a security mechanism being bypassed or thwarted by a threat agent. When a breach is combined with an attack, a penetration, or intrusion, can result.
define the term “penetration”
A penetration is the condition in which a threat agent has gained access to an organisation’s infrastructure through the circumvention of security controls and is able to directly imperil assets.
malware can be categorized into two groups, what are they?
- infection methods
- malware actions
based on the “manner of infection” what types of malware are there?
virus
worm
trojan
bot
what are the characteristics of a virus?
They can reproduce themselves and spread throughout the Internet by connecting to the host computer’s software, such as music or videos
what are the characteristics of a worm?
worms can also replicate themselves, but they do not affix themselves to the host computer’s software
✓ Worms are network-aware, which is their primary difference from viruses. They can quickly switch from one machine to another if a network is available
✓ They will not harm the target machine, but they might slow it down by taking up hard disc space, for example
what are the characteristics of a Trojan?
The software will carry out its mission of either stealing information or performing any other function for which it was designed when it is executed. They aim to conceal themselves inside software that seems to be trustworthy
what are the characteristics of a bot?
They are automated processes designed for online communication without human contact.
what types of malware exist based on its actions?
adware
ransomware
scareware
spyware
rootkits
zombies
what are the characteristics of Adware?
it violates users’ privacy
Your preferences are tracked, and they show you relevant ads
the adware can monitor your computer’s operations and possibly compromise it
what are the characteristics of spyware?
monitors internet actions and discloses the information to anyone who may be interested
what are the characteristics of Scareware?
In order to frighten you and convince you to take some sort of action, like paying them to fix your system, the software will display a message