Please enable JavaScript.
Coggle requires JavaScript to display documents.
Types of Security Threats (unstructured threats (Structured threats (…
Types of Security Threats
unstructured threats
common terms to be aware
:<3: Worm->virus that spreads by creating duplicates of itself on other drives, systems, or networks. A worm working with an email system can mail copies of itself to every address in the email system address book example=Code Red and Nimda
:<3: An apparently useful or amusing program, possibly a game or screensaver, but in the background it could be performing other tasks, such as deleting or changing data, or capturing passwords or keystrokes. A true Trojan horse isn’t technically a virus because it doesn’t replicate itself.
:<3: Virus ->A program capable of replicating with little or no user intervention, and the replicated programs also replicate
Structured threats
:warning: come from hackers that are more highly motivated and technically competent .
:warning: These people know system vulnerabilities, and can understand and develop exploit-code and scripts.
:warning: They understand, develop, and use sophisticated hacking techniques to penetrate unsuspecting businesses.
:warning: These groups are often involved with the major fraud and theft cases reported to law enforcement agencies.
:fire: These people know system vulnerabilities, and can understand and develop exploit-code and scripts.
:fire: They understand, develop, and use sophisticated hacking techniques to penetrate unsuspecting businesses.
:fire: These groups are often involved with the major fraud and theft cases reported to law enforcement agencies.
:fire: consist of mostly inexperienced individuals using easily available hacking tools such as shell scripts and password crackers.
Social Engineering
To protect against social engineering
• Never give out a password.
• Always ask for the ID of the unknown person.
• Restrict access of visitors.
• Escort all visitors.
• Never post your password.
• Lock your computer when you leave your desk.
• Do not let anyone follow you through a door that requires an access card.