Week 2A - Threats to Information Systems Flashcards
Threat Actor
Person or entity whose actions impact or have the
potential to impact information security
Threat Action
What was done or intended, to cause harm to the information asset
What are the 2 sources of threat?
External: from outside an organisation or system
Internal: lies within organisation and system
What are the 2 types of threats
Natural Events & Human Action (accidental and deliberate)
Threats - Natural Events
Potential for threat to occur may depend on physical location of the information asset
Threats - Human Action (Accidental)
No intention to cause harm, but actions do have potential for harm.
Threats - Human Action (Deliberate)
Actions intended to cause harm to information assets
What is Malware?
Malicious software deliberately designed to breach
security of computer based information systems
List 3 common types of Malware
Viruses
Worms
Trojan Horses
What is a virus?
Programs with the ability to replicate
What is a worm?
Programs with the ability to self-replicate (without human interaction)
What is a trojan horse?
Programs with known desirable properties
and hidden undesirable properties