Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
12 Cards in this Set
- Front
- Back
- 3rd side (hint)
Threat |
Set of circumstances with the potential harm to an assest by compromising security goals. External: theat source is outside the organisation. Internal: threat source is inside the organisation. |
External and internal |
|
Vulnerability |
Characteristic of or weakness in a system that could be used to cause harm if acted on by a threat |
|
|
Attack |
A security incident where vulnerabilities are deliberately exploited. |
|
|
Passive attack |
No interaction by the attacker other than listening or observing. Does not alter the info systems resources. Goal is to obtain the information. |
|
|
Active attack |
Requires some action or interaction with the infomation system by the attacker. Goals may be to obtain, modify,replicate or fabricate information. |
|
|
D/DOS |
Distributed Denial of service. Objective is to make infomation asset or resource unavailable to authorised users. Breach availibity of asset. Overload the resource requests, intterupt the communications beween users and resource. Distributed means multiple sources to make the request. |
|
|
Masquerade/spoofing |
One entity pretends to be another in order to deceive others. |
|
|
Spear/phishing |
Attempts to gain infomation by masquerading as a legitimate organisation. Spear phishing it targeted to a specific users. |
|
|
MITM |
man in the middle. An attacker positions themselves between to entites who wish to communicate. Interception: confidentiality Interuption: availability Modification: integrity |
|
|
Social engineering |
Using social skills to convice people to reveal infomation or permit access to resources. |
|
|
Replay attack |
Wher vaild data is recorded and retransmitted at a later date. |
|
|
Malware |
Malicious software deliberately designed to breach security of a computer based infomation systems. Virus needs human interaction Worms spread with out human interaction Trojans are hidden. |
|