Threats and Attacks Flashcards
What type of security threats and attacks are there?
- Unintentional
- Intentional
What are some examples of unintentional threats and attacks?
- Coding faults
- Operational faults
- Environmental faults
What are some examples of intentional security threats and attacks?
(Malicious code)
- Trojan horses
- Trap doors
- Viruses
- Worms
What is physical security?
It’s when we restrict access to an object by physical means.
Why is it bad to neglect physical security?
This can undermine other security mechanisms that protect a system. Pointless to have a good file-protection system if the hardware the file is stored on is easily accessible.
What are is a human factor that contribute to weak security?
Users can undermine system security through their naivete, laziness or dishonesty.
What is program security?
A set of conditions that programs that run on a computer are:
- written correctly
- installed and configured properly
- used in the way they were intended
- properly behaved (malicious code)
What are some examples of malicious code?
- Trojan horses
- Traps doors
- viruses
- worms
What are trojan horses?
A trojan horse is a program that is disguised as legitimate program but secretly has a malicious feature.
What is a root kit?
A collection of Trojan Horse programs that replace a range of system utility programs. With the goal to secretly take over a users system.
What is a trap door?
Flaws that designers place in programs so that specific security checks are not performed under certain circumstances.
What is a virus?
A fragment of code created to spread copies of itself to other programs
What does a virus require to spread?
A host (typically a program)
What is the goal of a virus?
To spread and infect as many hosts as possible.
What can viruses also do apart from spread?
They may have added malicious instructions that are run every time the viruses code is executed, such as deleting files or killing other running programs.