Vulnerabilities Flashcards
What is a threat?
A circumstance that has the potential to cause harm
What is an exploit?
An activity that takes advantage of a vulnerability.
What is malware?
Malicious software that encodes and exploit
What is an attack?
A vector - mechanism or entry route for an exploit
Why are international standards applied to systems?
Used to prove that risks have been accounted for and attempts to mitigate them have been made
COVER YOUR ASS
What factors are taken into account in risk analysis?
Subject: Person or process
Object: The what, data, file, process
Mode: Way of access/exploiting
Policy: The how who/what/how and possibly when
What forms can threats come in?
Malicious or non-malicious
Huiman or bot
Directed or random
What are the four kinds of threats?
Interception
Interruption
Fabrication
Modification
How can threats be reduced?
Multi-level authentication Principle of least privilege Fail securely Use of security policies Adherence of standards Continuous risk assessment
What is a virus?
Program that infects other programs or files, often also has a replication mechanism
Contains payload which can make changes to the user’s system, create backdoors or leak data
What is a trojan virus?
Virus that poses as a legitimate application but is indeed a virus
what is a logic bomb?
Virus that waits for a trigger, such as opening a file, at which point it violates a security policy
What is a worm virus?
Virus that replicates and spread through a network
What is a rabbit virus?
A virus that multiplies rapidly to fill up system resources ie IP tables, Ports
What is a botnet?
A network in which a virus has allowed for a large number of connected devices to be controlled.