Module 2 Flashcards

1
Q

Describe a few Threats to information security

A

software attacks,
intellectual property theft,
identity theft,
equipment theft,
information theft,
sabotage, and
information extortion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define the term “Threat”

A

includes anything that has the potential to breach security, harm one or more valuable objects, or negatively alter, erase, or otherwise affect them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

define/describe the term “attack”

A

An attack is the exploitation of a vulnerability by a threat agent.
an attack is any intentional attempt to exploit a vulnerability of an organisation’s security infrastructure to cause damage, loss, or disclosure of assets.
✓ An attack can also be viewed as any violation or failure to adhere to an organisation’s security policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

define the term “breach”

A

A breach is the occurrence of a security mechanism being bypassed or thwarted by a threat agent. When a breach is combined with an attack, a penetration, or intrusion, can result.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

define the term “penetration”

A

A penetration is the condition in which a threat agent has gained access to an organisation’s infrastructure through the circumvention of security controls and is able to directly imperil assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

malware can be categorized into two groups, what are they?

A
  1. infection methods
  2. malware actions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

based on the “manner of infection” what types of malware are there?

A

virus
worm
trojan
bot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what are the characteristics of a virus?

A

They can reproduce themselves and spread throughout the Internet by connecting to the host computer’s software, such as music or videos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what are the characteristics of a worm?

A

worms can also replicate themselves, but they do not affix themselves to the host computer’s software
✓ Worms are network-aware, which is their primary difference from viruses. They can quickly switch from one machine to another if a network is available
✓ They will not harm the target machine, but they might slow it down by taking up hard disc space, for example

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what are the characteristics of a Trojan?

A

The software will carry out its mission of either stealing information or performing any other function for which it was designed when it is executed. They aim to conceal themselves inside software that seems to be trustworthy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what are the characteristics of a bot?

A

They are automated processes designed for online communication without human contact.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what types of malware exist based on its actions?

A

adware
ransomware
scareware
spyware
rootkits
zombies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what are the characteristics of Adware?

A

it violates users’ privacy
Your preferences are tracked, and they show you relevant ads
the adware can monitor your computer’s operations and possibly compromise it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what are the characteristics of spyware?

A

monitors internet actions and discloses the information to anyone who may be interested

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what are the characteristics of Scareware?

A

In order to frighten you and convince you to take some sort of action, like paying them to fix your system, the software will display a message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what are the characteristics of Rootkits?

A

they are designed to achieve administrative rights on the target system, so it can steal anything, including confidential files and data

17
Q

what are the characteristics of Zombies?

A

they wait for an attacker’s commands instead of spying and stealing data

18
Q

what is the difference between active and passive attacks?

A

An active attack tries to change system resources or interfere with their operability.
A passive assault does not affect system resources but tries to get or use information from the system

19
Q

what are “assets”?

A

assets are not only physical items, such as machinery, but also intangible assets, such as a company’s reputation, patents, etc.

20
Q
A