Podcast
Questions and Answers
Which of the following best describes a computer security threat?
Which of the following best describes a computer security threat?
- A software designed to steal personal information
- The act of gaining unauthorized access to a system
- A potential violation of security that poses a danger to computer security/privacy (correct)
- An action that always results in a security breach
A violation must actually occur for there to be a computer security threat.
A violation must actually occur for there to be a computer security threat.
False (B)
What term describes individuals who execute actions that cause a security violation, or cause such actions to be executed?
What term describes individuals who execute actions that cause a security violation, or cause such actions to be executed?
attackers
Unathorized access to information is also called ______ or interception.
Unathorized access to information is also called ______ or interception.
Match the following security threats with their corresponding descriptions:
Match the following security threats with their corresponding descriptions:
Which category of security threats includes modification, spoofing, and repudiation of origin?
Which category of security threats includes modification, spoofing, and repudiation of origin?
An attack can only threaten the confidentiality of information.
An attack can only threaten the confidentiality of information.
What is the security goal that is threatened by denial of service attacks?
What is the security goal that is threatened by denial of service attacks?
______ refers to gaining information by monitoring traffic.
______ refers to gaining information by monitoring traffic.
Match the following security attacks with the security goal they threaten:
Match the following security attacks with the security goal they threaten:
Which of the following is a key difference between passive and active attacks?
Which of the following is a key difference between passive and active attacks?
Passive attacks are easy to detect, but difficult to prevent.
Passive attacks are easy to detect, but difficult to prevent.
What is the goal of a 'release of message contents' attack, and what broader category does it fall under?
What is the goal of a 'release of message contents' attack, and what broader category does it fall under?
Pretending to be a different user or entity is called ______.
Pretending to be a different user or entity is called ______.
Match each active attack category to its corresponding description:
Match each active attack category to its corresponding description:
Which type of attack involves making resources unavailable to legitimate traffic by overwhelming the system with bogus traffic?
Which type of attack involves making resources unavailable to legitimate traffic by overwhelming the system with bogus traffic?
Active attacks are difficult to detect but easyto prevent.
Active attacks are difficult to detect but easyto prevent.
What security principle is most directly compromised by masquerading?
What security principle is most directly compromised by masquerading?
A form of modification where data moving across a network is altered is known as active ______.
A form of modification where data moving across a network is altered is known as active ______.
Match the following active attacks with the security goal they primarily target:
Match the following active attacks with the security goal they primarily target:
Which of the following activities is considered a physical attack?
Which of the following activities is considered a physical attack?
Hacking always involves malicious intent.
Hacking always involves malicious intent.
What general term is used for software that has a malicious purpose?
What general term is used for software that has a malicious purpose?
A skilled computer expert who uses technical knowledge to overcome a problem is known as a(n) ______.
A skilled computer expert who uses technical knowledge to overcome a problem is known as a(n) ______.
Match the different types of hackers with their descriptions:
Match the different types of hackers with their descriptions:
Which of the following best describes the function of a computer virus?
Which of the following best describes the function of a computer virus?
A Trojan horse replicates and spreads by itself, like a virus.
A Trojan horse replicates and spreads by itself, like a virus.
What type of malware is defined as software that spies on what you do on your computer?
What type of malware is defined as software that spies on what you do on your computer?
A piece of spyware that downloads to your PC when you visit certain websites and saturates your machine with unwanted ads is called ______.
A piece of spyware that downloads to your PC when you visit certain websites and saturates your machine with unwanted ads is called ______.
Match the following types of malware with their respective descriptions:
Match the following types of malware with their respective descriptions:
Which of the following mechanisms describes how a virus initially spreads (infection)?
Which of the following mechanisms describes how a virus initially spreads (infection)?
The term 'virulent' refers to how difficult it is to remove a virus once it has infected a system.
The term 'virulent' refers to how difficult it is to remove a virus once it has infected a system.
What is the term for the action a virus performs once it has infected a system (e.g., deleting files)?
What is the term for the action a virus performs once it has infected a system (e.g., deleting files)?
Generic anti-virus solutions use ______ checking, while virus-specific solutions look for known viruses.
Generic anti-virus solutions use ______ checking, while virus-specific solutions look for known viruses.
Match each type of anti-virus countermeasure with its corresponding function:
Match each type of anti-virus countermeasure with its corresponding function:
Which function is not performed by anti-virus software?
Which function is not performed by anti-virus software?
Committing Internet fraud requires the same level of technical expertise as hacking or virus creation.
Committing Internet fraud requires the same level of technical expertise as hacking or virus creation.
What is the name for sending an unsolicited email promising a large sum of money with minimal investment?
What is the name for sending an unsolicited email promising a large sum of money with minimal investment?
______ is when one person takes on the identity of another.
______ is when one person takes on the identity of another.
Match the internet fraud with their descriptions:
Match the internet fraud with their descriptions:
Flashcards
What is a Threat?
What is a Threat?
A potential violation of security that poses a danger to computer security or privacy.
What are Attacks?
What are Attacks?
An action that could cause a violation to occur; guarded against or prepared for.
Who are Attackers?
Who are Attackers?
Individuals who execute threats or cause them to be executed.
What is Disclosure?
What is Disclosure?
Signup and view all the flashcards
What is Snooping?
What is Snooping?
Signup and view all the flashcards
What is Deception?
What is Deception?
Signup and view all the flashcards
What is Modification?
What is Modification?
Signup and view all the flashcards
What is Disruption?
What is Disruption?
Signup and view all the flashcards
What defines an Attack?
What defines an Attack?
Signup and view all the flashcards
What does Snooping Threaten?
What does Snooping Threaten?
Signup and view all the flashcards
What is Traffic Analysis?
What is Traffic Analysis?
Signup and view all the flashcards
What is Modification?
What is Modification?
Signup and view all the flashcards
What is Masquerading/Spoofing?
What is Masquerading/Spoofing?
Signup and view all the flashcards
What is Replaying?
What is Replaying?
Signup and view all the flashcards
What is Repudiation?
What is Repudiation?
Signup and view all the flashcards
What is DOS?
What is DOS?
Signup and view all the flashcards
What is Passive Attack?
What is Passive Attack?
Signup and view all the flashcards
What is Active Attack?
What is Active Attack?
Signup and view all the flashcards
What is Traffic Analysis?
What is Traffic Analysis?
Signup and view all the flashcards
What is Spoofing/Masquerading?
What is Spoofing/Masquerading?
Signup and view all the flashcards
What is Modification/Alteration?
What is Modification/Alteration?
Signup and view all the flashcards
What is delay?
What is delay?
Signup and view all the flashcards
What is DOS (Denial of Service)
What is DOS (Denial of Service)
Signup and view all the flashcards
What is a Hacker?
What is a Hacker?
Signup and view all the flashcards
Who is a Cracker?
Who is a Cracker?
Signup and view all the flashcards
Who is a Grey Hat?
Who is a Grey Hat?
Signup and view all the flashcards
What is Malware?
What is Malware?
Signup and view all the flashcards
What is Hacking?
What is Hacking?
Signup and view all the flashcards
What is a Virus?
What is a Virus?
Signup and view all the flashcards
What is a Worm?
What is a Worm?
Signup and view all the flashcards
What is a Trojan Horse?
What is a Trojan Horse?
Signup and view all the flashcards
What is Spyware?
What is Spyware?
Signup and view all the flashcards
What is Adware?
What is Adware?
Signup and view all the flashcards
What is a Logic Bomb?
What is a Logic Bomb?
Signup and view all the flashcards
What is a Bacteria/Rabbit?
What is a Bacteria/Rabbit?
Signup and view all the flashcards
What is a Nonvirus Virus/Hoax?
What is a Nonvirus Virus/Hoax?
Signup and view all the flashcards
What is infection step in virus?
What is infection step in virus?
Signup and view all the flashcards
What are Trigger Mechanisms?
What are Trigger Mechanisms?
Signup and view all the flashcards
Effects (Payload)?
Effects (Payload)?
Signup and view all the flashcards
Study Notes
Computer Security Threats and Attacks
- A threat is a potential violation of security, posing a danger to computer security or privacy through a person, act, or object.
- Actions taken to cause a violation are called attacks, and those who execute them are attackers.
Types of Threats
- Disclosure involves unauthorized access to information, sometimes called snooping or interception.
- Deception involves acceptance of false data through modification, spoofing, repudiation of origin, or denial of receipt.
- Disruption involves interruption or prevention of correct operation.
- Usurpation involves unauthorized control of a system part.
Attacks
- An attack is a security threat aimed at obtaining, altering, destroying, removing, implanting, or revealing information without permission, affecting individuals and organizations.
- Security attacks can threaten goals such as confidentiality, integrity, availability, and authentication.
- Taxonomy of attacks relative to security goals:
- Snooping and traffic analysis threaten confidentiality.
- Modification, masquerading, replaying, and repudiation threaten integrity.
- Denial of service threatens availability.
- Snooping is unauthorized data access, while traffic analysis obtains information by monitoring online traffic.
- Modification involves intercepting and changing messages, whereas masquerading or spoofing impersonates someone else.
- Replaying reuses a captured message, and repudiation involves message senders or receivers denying having sent or received a message.
- Denial of Service (DoS) attacks are common and can slow down or interrupt a system's service.
Types of Attacks: Passive vs. Active
- Categorization involves classifying attacks as either passive or active.
- Passive attacks aim to learn or use information without affecting system resources.
- There are two types of passive attacks: release of message contents (sniffing) and traffic analysis.
- Release of message contents involves an opponent learning the contents of transmissions, also known as interception.
- Traffic analysis determines the location, identity, frequency, and length of exchanged messages.
Active Attacks
- An active attack alters system resources or operations, involving online actions where the intruder controls transmitted data.
- The attacker can modify, extend, delete, or replay data, masquerade as a different entity, modify messages in transit, add or delete messages, or cause a denial of service.
- Categories of active attacks:
- Spoofing or masquerading (fabrication) attacks authenticity.
- Modification or alteration attacks integrity.
- Delay affects availability.
- Denial of Service (DoS) degrades or interrupts service, affecting availability.
- Spoofing or Masquerading:
- Involves impersonation by falsifying data to gain illegitimate advantage.
- It lures a victim into believing they communicate with a different entity.
- Modification or Alteration:
- It consists if an unauthorized change of information
- Encompasses deception, disruption, and usurpation if modified data is relied upon or controls system operation.
- Active wiretapping alters network data.
Types of Active Attacks
- Delay:
- Involves a temporary inhibition of a service.
- Can be a form of usurpation.
- Attackers manipulate system control structures to delay message delivery.
- Denial of Service (DOS):
- Attackers overwhelm resources, making them unavailable to legitimate traffic.
- This includes blocking legitimate user access.
- It's considered a form of usurpation.
Summary of Attacks by Category
- Snooping, traffic analysis, and message content release are passive attacks, threatening confidentiality.
- Modification, masquerading, replaying, and repudiation are active attacks, threatening integrity.
- Denial of Service and delay are active attacks, threatening availability.
Types of Threats/Attacks
- Physical attacks involve stealing, breaking, or damaging computing devices.
- Denial of Service (DoS) attacks.
- Malware attacks are a generic term for software with malicious purposes.
- Hacking (intrusion) attacks are attempts gaining unauthorized system access, possibly malicious.
- Hackers:
- They are skilled computer experts.
- They gain unauthorized access to computers
-There are three types:
- Ethical hackers (White hat): They gain access to fix weaknesses, perform testing, and assess vulnerabilities.
- Cracker (black hat): They gain unauthorized access for personal gain, often stealing data.
- Grey hat (both): They break into systems without authority to identify and reveal weaknesses to the owner.
Malware Attacks
- Examples are viruses, worms, Trojan horses, spyware, and logic bombs.
- Virus:
- Replicates itself inside other programs, usually without knowledge.
- Similar to a biological, and spreads on its own.
- Varies damage depending on the intention of the writer.
- Worm:
- It is an independent program that duplicates itself across computers, usually on networks.
- Classified has virus or worms.
- It can creates of denial of service.
- Trojan Horse:
- Is benign appearing software that downloads a virus or malware.
More Malware Attacks
- Spyware: It spies on computer activity.
- Tracking cookies save data, which allows tracking Internet browser history.
- Keyloggers record keystrokes to capture usernames and passwords.
- Legal uses of spyware involve employer monitoring of employee tech use, parental monitoring of home computers and protecting children from online predators.
- Adware: Downloads to PCs when visiting websites.
- It causes no harm to files or gathers sensitive information from a PC, but saturates with adds.
- Counter exploitation website (www.cexx.org) provides a list of spyware and how to remove it.
- The Spyware Guide ((www.spywareguide.com) lists spyware that can be gotten from the Internet.
How Malware Attack Affects you
- Logic bomb lays dormant until a specific condition is met, and performs a malicious act like deleting files.
- Bacterium or Rabbit.
- Absorbs all of some class of resource
- Nonvirus or a hoax.
- Perpetrators send an email, and instructs people to delete some file when it is really a virus.
- Software attacks viruses/worms:
- First, the Virus should search for and detect objects to infect.
How to Deal with Infections
- Installation into the infectable object:
- Writing on the boots sector
- Scan computer or connections for connections
Effects:
- Virus Term virulent mean to spread rapidly or infects new targets.
- General infection process:
- Read your email ad nauseum
- Add some for all executable or auto-executable programs
- Write a macro on all programs
- Includes triggering mechanisms like dates, number of infections, or first use.
- Payloads can do anything a legitimate program can, including displaying messages, deleting files, formatting the hard disk, overloading memory or changing system settings.
- Virus Writers: Adolescents.
-Ethically average w/ above intelligence
- College Students not normal and express writing viruses as not “wrong” -- Adult Virus creators: Ethically writing virus software.
- Three Methods for virus prevention are scanners activity monitoring and change detection
Anti-Virus
- Generic integrity checking and virus specific solutions are available for most computer systems.
- Scanner checks matching signatures activity monitors if a program is behaving in a consistent way, and change detection software Three categories
Preventing Virus Infection
- Identification of known viruses, detections of viruses being used
- If the virus is blocked/ deleted this means it has been disinfected.
- For additional safety the object can be overridden of rewritten completely.
- Use a virus scanner.
- Do not open un known emails from unknown people
- Do not click "Security Alerts" as Microsoft does nit send out these
Internet Fraud
- Internet fraud does not require technical experience, and takes 3 forms.
- The amount of commerce online allows endless possibilities form scammers
Scams
- This includes outrageous sums of money with minimal investment
- Sending email that suggest that one can make an outrageous sum of money with a minimal investment.
Identity Theft
- One person takes the others identity.
- Attempt is usually to make purchases otherwise its obtaining credit cards and getting credit in another person's name.
- Phishing is one of the most common ways of identity theft, by getting others to provide you with personal information.
- An example is sending an email from the bank, where they must verify account from clicking a link, but the link is a set up by the attacker.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.