Week 10 Flashcards
IT Risk
Planning Principles
Risk Analysis
Comprehensive
Security
Defence in depth
Minimum Permissions
What is Malware?
– A general name for evil software
– software intentionally designed to cause damage to
a computer, server, client, or computer network
Difference between Vulnerability-Specific and Universal Malware
– Vulnerability-specific malware requires a specific
vulnerability to be effective.
– Universal malware does not require a specific
vulnerability to be effectivere
What is Riskware?
- Usually offers some benefit at a “cost”
– Compromises security
– Acts illegally - Riskware might
– Block another application
– Be used as a backdoor for other malware.
– Indicate the presence of other malware.
What is Social Engineering?
Tricking the victim into doing something against his
or her interests
What is Fraud?
Lying to the user to get the user to do something
against his or her financial self-interest
What is Spam?
– Unsolicited
commercial e-mail
– Often fraudulent
What are E-Mail Attachments used for?
– link to a Website with
Malware
– This may complete
the fraud or download
software to the victim
What are Phishing Attacks?
– Sophisticated social
engineering attacks
– authentic-looking e-
mail or Website
What do Phishers do?
- Phishers
– decide which business to target
– how to get e-mail addresses for the customers of
that business.
– use the same mass-mailing and address collection
techniques as spammers - Phisher targets
– Banking e.g. Bank of Ireland
– Payment services e.g. paypal
– Social media e.g. Facebook
– Government e.g. Revenue
Credit Card Number Theft
– Performed by “carders”
– Make purchases with stolen credit card
Identity Theft
– Collecting enough data to impersonate
the victim in large financial transactions
– Can cause greater harm than carding
– May take a long time to restore the victim’s credit
rating
What is vandalism/sabotage?
Deliberate damage to hardware, software and/or
data, including companies’ websites
Why are Disgruntled and Ex-Employees dangerous?
– Extensive access to systems, with privileges
– Knowledge about how systems work
– Knowledge about how to avoid detection
What is a Logic Bomb?
– Destructive computer program that activates at a
certain time or in reaction to a specific event