The three pillars of the CIA Triad are these.
What are Confidentiality, Integrity, and Availability?
The word “malware” is short for this phrase, describing harmful programs designed to damage, disrupt, or steal data.
Malicious Software
This type of malware disguises itself as legitimate software but secretly delivers malicious code.
Trojan Horse
This type of malware changes its code or appearance every time it spreads.
Polymorphic Malware
This type of malicious program is considered the most dangerous to confidentiality, since it secretly allows attackers to access sensitive data without detection.
Backdoor
In the CIA Triad, this pillar ensures that information is not altered or tampered with.
Integrity
A computer program that damages systems, steals data, or disrupts operations is broadly called this.
Malware
This malware locks or encrypts files and demands payment from the victim to restore access.
Ransomware
Polymorphic malware avoids detection by doing this, while still keeping the same malicious behavior.
Constantly changing its code
Among ransomware and a worm that launches Distributed Denial of Service attacks, this one poses the greater risk to availability by overwhelming systems and taking them offline.
DDoS worm
In the CIA Triad, this pillar ensures that data is only available to authorized people.
Confidentiality
A program that attaches itself to files and spreads when those files are executed is called this.
Virus
For a Trojan Horse, this aspect is the greater danger—since it tricks users into installing it in the first place.
Disguise
This type of malware avoids detection by constantly changing its code while keeping the same malicious behavior.
Polymorphic Malware
Within the CIA+ model, this feature ensures that a sender cannot later deny sending a malicious email, often enforced through mechanisms like digital signatures.
Non-repudiation
Within CIA+, this concept verifies a user’s identity, proving they are who they claim to be.
Authentication
A program that self-replicates across networks without needing a host file is called this.
Worm
In cybersecurity, this is a hidden method of bypassing authentication to gain unauthorized access to a system.
Backdoor
The difference between these two is that one keeps the same code and is easier to detect, while the other changes its code every time it spreads.
The difference between standard and polymorphic malware
If ransomware locks all your files so you cannot use them, this principle of the CIA Triad is violated.
Availability
Within CIA+, this concept provides proof that a user cannot deny an action they performed.
Non-repudiation
Between a worm and a virus, this one spreads faster because it doesn’t need a host file or user action.
Worm
The difference between these two is that one is usually inserted maliciously by attackers, while the other is intentionally left by developers to bypass security during development.
What is the difference between a backdoor and a trapdoor?
This term refers to the method or pathway through which malware spreads.
Propagation Vector
When a worm deletes records from a database, it compromises this principle of the CIA Triad, which ensures information remains accurate and unaltered.
Integrity