ITM 431 Ch. 3

  1. You cannot defend yourself unless you know the threat environment you face
  2. Malware
    • General name for evil software
    • Vulnerabilities are security flaws in specific programs
    • Vulnerability-specific malware requires a specific vulnerability to be effective
    • Universal Malware does not require a specific vulnerability to be effective
  3. What types of threats are most feared by IT security professionals
    • Insider Threats
    • Unpatched Vulnerability
    • Next-Generation Malware
  4. There are three types of Malware
    Trojan Virus Worm
  5. Virus
    • Code that attaches to other programs
    • executes when program executes
    • can travel through email, websites, social networking, USB Ram Sticks, peer to peer sharing
  6. Stopping viruses
    • antivirus programs scan filesĀ 
    • patching may or may not help
  7. Worms
    • Stand-alone programs that do not need attachment
    • can propagate like viruses through email which requires human gullibility
    • Antivirus programs search for worms as well as viruses
  8. Directly propagating worm jump to victim hosts directly
    • can only do this with specific vulnearblity
    • amazing speed
    • can be thwarted by firewalls and installing patches
    • not by antivirus programs
  9. normal propagate virus can be stopped by antivirus and sometimes patches
    directly propagating worms cannot be stopped by antivirus and can be stopped by firewalls and patches
  10. Trojan Horse
    programs that disguise themselves as system files
  11. spyware trojans collect sensitive data send data to attacker
    • Website activity trackersĀ 
    • keystroke loggers
    • data mining software
Card Set
ITM 431 Ch. 3