Information Security: Threats, Malware, and Organizational Safeguards

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/20

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

21 Terms

1
New cards

Business need for Information Security

Protects the organization's ability to function and maintain services, data, and operations even when facing security threats.

2
New cards

Four functions of Info Security System

1. Functionality protection, 2. Application protection, 3. Data protection (stored, processed, transmitted), 4. Technological asset protection.

3
New cards

General management role in security

Identifies security needs, creates policies, and designs procedures that IT implements for the whole organization.

4
New cards

IT management role in security

Implements, maintains, and monitors security systems and policies as directed by general management.

5
New cards

Stages of organizational data

Stored, processed, transmitted—each requires separate safeguards.

6
New cards

Three core types of business applications

Email systems, instant messaging, operating systems—essential for daily operations.

7
New cards

What is a threat?

Anything (object, person, entity) representing a constant danger to assets due to system vulnerabilities.

8
New cards

How threats are created

System vulnerabilities in software, hardware, or networks allow attackers to exploit weaknesses.

9
New cards

Definition of malware

Malicious software designed to damage, disrupt, steal, or deny resources—includes viruses, worms, Trojans, adware, spyware.

10
New cards

Three main virus characteristics

Infection (attaches to files), replication (creates copies of itself), propagation (spreads within/across systems).

11
New cards

Difference between virus and worm

Virus needs a host program; worm is self-activating and spreads independently.

12
New cards

Non-resident virus behavior

Uses a search module to find files and a replication module to infect them.

13
New cards

Resident virus behavior

Loads replication module into memory and infects every file operated on by the OS—no search module.

14
New cards

Fast infector vs slow infector

Fast infectors attack many files quickly, easy to detect but highly damaging; slow infectors activate rarely, harder to detect but less damage.

15
New cards

Macro virus definition

Virus written in scripting language targeting programs like Word or Excel, spreading via documents.

16
New cards

Adware and spyware features

Can infect programs, gather info or display unwanted ads, but do not self-replicate—so not true viruses.

17
New cards

Worm characteristics

Independent, infects files, replicates, propagates and activates itself when pre-set conditions are met.

18
New cards

Trojan horse definition

Apparently useful programs with hidden malicious code, used for indirect unauthorized access or harm.

19
New cards

How viruses replicate

Attach to executable files; activate when files are run, duplicating the virus across programs.

20
New cards

How worms propagate

Self-activate and spread across networks or devices without user interaction.

21
New cards

Best practices to minimize threats

Regular security audits, patching vulnerabilities, use of antivirus software, setting strong policies, employee training.