Professional Documents
Culture Documents
Nobody believes anything bad can happen to them, until it Happen !!!
Threats
The Internal Threats
The biggest threat to your firm's security might well come from inside the company
itself.
Unsatisfied Employee
Malicious Programs
Trapdoor
Logic Bomb
Trojan Horse
An attack that works by carrying out some action against the target
Modification
Insertion
Masquerading
DoS
Backdoor
Something a hacker leaves behind on a system in order to be able to get back in at a later time.
Exploit
Hijack
An attack whereby the hacker attempts to take over one side of an existing (authenticated)
connection
Man-in-the-Middle
An attacker where the hacker interposes himself in the middle between two people
Penetration Testing
A penetration test is where a client hires ethical hackers to attempt to break into their systems
Threat
A threat is an action or event that might breach security. Normally a threat is a potential
security Violation
Vulnerability
Technology weakness
TCP/IP
Policy weakness
Configuration weakness
Structured threats
Internal threats
External threats
Viruses are "programs" that modify other programs on a computer, inserting copies
of themselves. Viruses are not distinct programs - they cannot run on their own,
and need to have some host program, of which they are a part, executed to activate
them.
Trojan horses are programs that appear to have one function but actually perform
another function. Trojan horses are named after the Trojan horse of myth.
Analogous to their namesake, modern-day Trojan horses resemble a program that
the user wishes to run - a game, a spreadsheet, or an editor. While the program
appears to be doing what the user wants, it is also doing something else unrelated
to its advertised purpose, and without the user's knowledge.