Threats

THREATS
 * Type 1 – “Bad Things Out There”**


 * __ Malware __** is software designed to secretly access your computer. Malware includes viruses, worms, Trojans, rootkits, spyware, ect.

A **__ payload __** is malware caused by a virus or other malicious code executed by the exploit on the target computer. It may move, alter, overwrite, delete file, or commit other destructive activity.

A **__ virus __** is a self-copying program that overwrites storage. EX: A boot sector virus. The boot sector is a portion of storage set aside for start-up. A **__ worm __** spreads across networks automatically.

A **__ zombie __** takes remote control of a victim PC. A collection of zombies (thousands or millions) make up a **__ botnet __**, which 1 person or 1 group controls. The botnet launches a DDOS (distributed denial of service) attack. In a DDOS attack, hackers send tons of pings to a server so that legitimate users can not access the service (website).

Ping- a network utility
 * __ Trojans __** are malware, often sent through email/web links that offer attractive objects, then infect the computer with a virus (software).


 * __ Logic bombs __** execute under a given condition.


 * __ Time bombs __** are triggered by a date.


 * __ Root kits __** change the system software, making the attack invisible.


 * __ Keylogger __** ( keystroke logging) is the action of tracking (or loggin) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their action are being monitored.

A **backdoor** in a [|computer] system (or [|cryptosystem] or [|algorithm] ) is a method of bypassing normal [|authentication], securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected. The backdoor may take the form of an installed program (e.g., [|Back Orifice] ), or could be a modification to an existing program or hardware device.
 * __ Backdoor __**- A logon not using normal program.


 * __ Phishing __** is the act of getting data by asking for it (email). This is not malware, it is a method. Whaling is the targeting (phishing) of CISOs (Chief Information Security Officer) or other highly level people.


 * __ Social engineering __** is talking people into giving away information.


 * Type 2 – “Bad Things that can happen to you (vandalism, network intrusion, data theft, identity theft)**

Examples of assets are software, processing; valuable data (ex. Ssn). Bandwidth


 * __ Threat agents __** are the cause of the threat (attack).

The **__ Exploit __** is the means of the attack.

**Safe Mode** – When windows boots up in a minimal amount of devices

BIOS- Basic Input Output System __5 Devices __ I→P(processing)→O Storage Communciation Information Systems: Hardware, Software (bugs), Information, People, Procedures


 * Disk Operating System (DOS) is an operating system. The cmd prompt screen is an example of DOS.**


 * [|Intrusion Detection System] (security), is software and/or hardware designed to detect unwanted attempts at accessing, manipulating, and/or disabling of computer systems, mainly through a network, such as the Internet **