Please enable JavaScript.
Coggle requires JavaScript to display documents.
Chapter 1 (Describe common information security concerns (Malware (general…
Chapter 1
Describe common information security concerns
Malware
general term, refers to any software that performs some sort mof harmful activity
Spyware & Keystroke Loggers
Also form of malware. Spyware is any technology that secretly gathers information. Keystroke logger is a program that records keystrokes made on a keyboard
Phishing & Targeted Phishing Scams
form of internet fraud where attackers attemp to steal valuable information
Logic Bombs
Harmful code intentionally left on a system, lies dormant for a period of time. When conditions are met, it "explodes"/activates and carries out its malicious function
Social Engineering
describs an attack that relies heavily on human interaction, involves tricking people to break normal security procedures to gain sencitive information
Backdoors
Also called a trapdoor, a way to access a computer that bypasses normal mechanisms, can be used when programming for quiz trouble shooting
Shoulder Surfing
occurs when an attack looks over the shoulder of another person at a computer to discover sencitive information
Denial of Service Attacks
Disrupts information systems, makes it so legitimate users are unable to use the systems
Describe mechanisms used to protect information security
Contracts
The thing that states the ground rules and obligations between company A and and the company they are outsourcing with
Organizational Governance
Organization's governance documents, such as Policies, Standards, Guildlines, and Procedures
Laws and Legal Duties
The laws that state the what information compainies legally have to protect
Voluntary Organization
Voluntary membership groups that promote information security, they have rules that they agree to follow