THREATS

Type 1 – “Bad Things Out There”

Malware is software designed to secretly access your computer. Malware includes viruses, worms, Trojans, rootkits, spyware, ect.

A payload is malware caused by a virus or other malicious code executed by the exploit on the target computer. It may move, alter, overwrite, delete file, or commit other destructive activity.

A virus is a self-copying program that overwrites storage.
EX: A boot sector virus. The boot sector is a portion of storage set aside for start-up.
A worm spreads across networks automatically.

A zombie takes remote control of a victim PC. A collection of zombies (thousands or millions) make up a botnet, which 1 person or 1 group controls. The botnet launches a DDOS (distributed denial of service) attack. In a DDOS attack, hackers send tons of pings to a server so that legitimate users can not access the service (website).

Trojans are malware, often sent through email/web links that offer attractive objects, then infect the computer with a virus (software).
Ping- a network utility

Logic bombs execute under a given condition.

Time bombs are triggered by a date.

Root kits change the system software, making the attack invisible.

Keylogger ( keystroke logging) is the action of tracking (or loggin) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their action are being monitored.

Backdoor- A logon not using normal program.
A backdoor in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected. The backdoor may take the form of an installed program (e.g., Back Orifice), or could be a modification to an existing program or hardware device.



Phishing is the act of getting data by asking for it (email). This is not malware, it is a method. Whaling is the targeting (phishing) of CISOs (Chief Information Security Officer) or other highly level people.

Social engineering is talking people into giving away information.

Type 2 – “Bad Things that can happen to you (vandalism, network intrusion, data theft, identity theft)

Examples of assets are software, processing; valuable data (ex. Ssn). Bandwidth

Threat agents are the cause of the threat (attack).

The Exploit is the means of the attack.



Safe Mode – When windows boots up in a minimal amount of devices


BIOS- Basic Input Output System
5 Devices



I→P(processing)→O
Storage
Communciation
Information Systems: Hardware, Software (bugs), Information, People, Procedures

Disk Operating System (DOS) is an operating system. The cmd prompt screen is an example of DOS.

Intrusion Detection System (security), is software and/or hardware designed to detect unwanted attempts at accessing, manipulating, and/or disabling of computer systems, mainly through a network, such as the Internet