1/20
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Business need for Information Security
Protects the organization's ability to function and maintain services, data, and operations even when facing security threats.
Four functions of Info Security System
1. Functionality protection, 2. Application protection, 3. Data protection (stored, processed, transmitted), 4. Technological asset protection.
General management role in security
Identifies security needs, creates policies, and designs procedures that IT implements for the whole organization.
IT management role in security
Implements, maintains, and monitors security systems and policies as directed by general management.
Stages of organizational data
Stored, processed, transmitted—each requires separate safeguards.
Three core types of business applications
Email systems, instant messaging, operating systems—essential for daily operations.
What is a threat?
Anything (object, person, entity) representing a constant danger to assets due to system vulnerabilities.
How threats are created
System vulnerabilities in software, hardware, or networks allow attackers to exploit weaknesses.
Definition of malware
Malicious software designed to damage, disrupt, steal, or deny resources—includes viruses, worms, Trojans, adware, spyware.
Three main virus characteristics
Infection (attaches to files), replication (creates copies of itself), propagation (spreads within/across systems).
Difference between virus and worm
Virus needs a host program; worm is self-activating and spreads independently.
Non-resident virus behavior
Uses a search module to find files and a replication module to infect them.
Resident virus behavior
Loads replication module into memory and infects every file operated on by the OS—no search module.
Fast infector vs slow infector
Fast infectors attack many files quickly, easy to detect but highly damaging; slow infectors activate rarely, harder to detect but less damage.
Macro virus definition
Virus written in scripting language targeting programs like Word or Excel, spreading via documents.
Adware and spyware features
Can infect programs, gather info or display unwanted ads, but do not self-replicate—so not true viruses.
Worm characteristics
Independent, infects files, replicates, propagates and activates itself when pre-set conditions are met.
Trojan horse definition
Apparently useful programs with hidden malicious code, used for indirect unauthorized access or harm.
How viruses replicate
Attach to executable files; activate when files are run, duplicating the virus across programs.
How worms propagate
Self-activate and spread across networks or devices without user interaction.
Best practices to minimize threats
Regular security audits, patching vulnerabilities, use of antivirus software, setting strong policies, employee training.