• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/12

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

12 Cards in this Set

  • Front
  • Back
  • 3rd side (hint)

Threat

Set of circumstances with the potential harm to an assest by compromising security goals.



External: theat source is outside the organisation.



Internal: threat source is inside the organisation.


External and internal

Vulnerability

Characteristic of or weakness in a system that could be used to cause harm if acted on by a threat

Attack

A security incident where vulnerabilities are deliberately exploited.

Passive attack

No interaction by the attacker other than listening or observing.


Does not alter the info systems resources.


Goal is to obtain the information.

Active attack

Requires some action or interaction with the infomation system by the attacker.


Goals may be to obtain, modify,replicate or fabricate information.

D/DOS

Distributed Denial of service.


Objective is to make infomation asset or resource unavailable to authorised users.



Breach availibity of asset. Overload the resource requests, intterupt the communications beween users and resource.



Distributed means multiple sources to make the request.

Masquerade/spoofing

One entity pretends to be another in order to deceive others.

Spear/phishing

Attempts to gain infomation by masquerading as a legitimate organisation.



Spear phishing it targeted to a specific users.

MITM

man in the middle.


An attacker positions themselves between to entites who wish to communicate.



Interception: confidentiality


Interuption: availability


Modification: integrity


Social engineering

Using social skills to convice people to reveal infomation or permit access to resources.

Replay attack

Wher vaild data is recorded and retransmitted at a later date.

Malware

Malicious software deliberately designed to breach security of a computer based infomation systems.



Virus needs human interaction


Worms spread with out human interaction


Trojans are hidden.