Please enable JavaScript.
Coggle requires JavaScript to display documents.
Security - Coggle Diagram
Security
Virus Types
File
Boot
Macro
Rootkit
Source code
Polymorphic
Encrypted
Stealth
Multipartite
Armored
Countermeasures
Physical
Network
Operating system
Attack surface
Set of attack points
Application
Code review
Attacks
Intruder / hacker / attacker
Types
Breach of integrity (unauthorised modification)
Breach of availability (unauthorised destruction)
Theft of service (unauthorised use of resources)
Denial of service (DOS) (preventing legitimate use of the system)
Breach of confidentiality (capturing secret data)
Methods
Masquerading
Authentication
Replay attack
Message modification
Man-in-the-middle attack
Sender to reserver and vice versa
Session hijacking
Privilege escalation
Social engineering
Phishing
Threats
Program Treats
Back-door daemon / Remote Access Tool (RAT)
Malware
Trojan horse
Spyware
Silently executing
Exploit / disable / damage
Ransomware
Encrypts everything
Trap door / back door
Logic bomb
Code Injection
Buffer overflow
Shellcode
Script kiddie
Viruses and Worms
Embedded in legitimate program
Operating specific
Architecture specific
Worms replicate without any help from humans
Viruses require human activity
Macros
Virus dropper (usually Trojan horse)
Keystroke logger
Monoculture
System and Network Threats
Port Scanning
Denial of Service
Distributed Denial-of-Service (DDos)
Imposible to prevent
Can be accidental
Attacking Network Traffic
Sniffin
Spoofin
Zombie systems
Secure by default
Cryptography
Keys
Back door
Measure of confidence that the integrity of a system and its data will be preserved
Dark Web