You are on page 1of 3

Information security is a weird egg.

You can be in it and understand it, yet have a hard time


explaining it to the lay person or even your colleagues. Networks are like candy bars: Hard and
crunchy on the outside, but soft and gooey on the inside[1]. For any analogy to be presented
there should be 1) Asset 2) Threat 3) Threat Actor 4) Vulnerability 5) Attack Vector. All the
analogies are represented in the picture presented before you.

https://www.tripwire.com/state-of-security/security-data-protection/32-of-the-best-and-worst-
infosec-analogies/

I totally agree with your presentation. Added to it, once activated, Trojans can enable cyber-
criminals to spy on you, steal your sensitive data, and gain backdoor access to your system.
These actions can include:
Deleting data
Blocking data
Modifying data
Copying data
Disrupting the performance of computers or computer networks
Unlike computer viruses and worms, Trojans are not able to self-replicate.
Hi Trisha Sony

You have excellently discussed about Ransomware and supplementary to this I would like to add
from the contents of the reference [1] that this is a type of malicious software from
cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a
ransom is paid. While some simple ransomware may lock the system in a way which is not
difficult for a knowledgeable person to reverse, more advanced malware uses a technique called
cryptoviral extortion, in which it encrypts the victim's files, making them inaccessible, and
demands a ransom payment to decrypt them. Whereas author Eric in his article [2] has presented
the action of the same and stated that The simplest type of ransomware, aka scareware, consists
of bogus antivirus or clean-up tools that claim they’ve detected umpteen issues, and demand that
you pay in order to fix them. Some specimens of this variety of ransomware may allow you to
use your PC but bombard you with alerts and pop-ups, while others might prevent you from
running any programs at all. Typically these invaders are the easiest type of ransomware to
remove. And he added the way to remove the simple ransomware which I think will be helpful to
most of us.
The entire narration in[2] has typically represented the security analogy to be presented which
should be 1) Asset 2) Threat 3) Threat Actor 4) Vulnerability 5) Attack Vector.

References :
[1] Ransomware retrieved on 16-3-2019 from https://en.wikipedia.org/wiki/Ransomware
[2] How to rescue your PC from ransomware by Eric retrieved on 16-3-2019 from
https://www.pcworld.com/article/2084002/how-to-rescue-your-pc-from-ransomware.html
HI Sai Krishna

You have marvelously depicted the Information Security Analogies in the picture, same as that
was exactly needed for the present discussion. The entire narration of you has typically
represented the security analogy to be presented which should be consisting of 1) Asset 2) Threat
3) Threat Actor 4) Vulnerability 5) Attack Vect
or. I think you to accept that the attack vector is chosen based on the asset and the vulnerability .

Hi Jason Robson
A great deposition on the SPYWARE topology. I too agree that Spyware is one of the most
common threats on the internet. It can easily infect your device and it can be hard to identify.
Spyware is a threat to businesses and individual users, since it can steal sensitive information and
harm your network.
I think the following narration will assist you to further elaborate your deposition. As per article
[1], there are four main types of spyware. Each uses unique tactics to track you.
Adware. Adware is used for marketing purposes and can slow down your computer.
Trojan. This kind of malicious software disguises itself as legitimate software. For example,
Trojans may appear to be a Java or Flash Player update upon download.
Tracking cookies. These track the user’s web activities, such as searches, history, and
downloads, for marketing purposes.
System monitors. System monitors can record all keystrokes, emails, chat-room dialogs,
websites visited, and programs run. System monitors are often disguised as freeware.
References :
[1] What is spyware? And how to remove it retrieved on 16/3/2019 from
https://us.norton.com/internetsecurity-how-to-catch-spyware-before-it-snags-you.html

You might also like