Definitions
Definitions
Preventative Measures
Business Implications
100
Anjola is an avid online shopper. She sees a lot of ads on her webpage of similar products she has bought when browsing the Internet.
What is Adware?
100
A segment of self-replicating, executable code that attaches itself to a file or program.
What is a virus?
100
This software scans, identifies, and destroys viruses
What is an antivirus software?
100
This may be used to monitor employee activity by recording user's keystrokes, emails, and websites visited.
What is a benefit of key logging software?
200
Trojan horses that lie idle until triggered by a specified date or time, by a change in the system or by an event that does not happen.
What is time bomb or logic bomb?
200
Hides data files inside a host file, such as a large image or sound file.
What is Steganography Programs?
200
This regular procedure should maintain at least two copies of all files.
What is a backup?
200
Records telecommuter's network interactions, copies corporate data, and introduces this type of malware to the entire organization.
What is spyware?
300
Taking control of someone else’s phone to make or listen to calls, send/read text messages, connect to the Internet, forward victim’s calls, and call numbers that charge fees
What is bluebugging?
300
Captures confidential information with key words such as government, war, etc. as they travel over networks.
What is packet sniffers?
300
A unique way in which an organization can educate employees about harmful Malware.
What is corporate training sessions?
300
Infected 1 in 12 e-mails and did $4.75 billion in damages.
What is MyDoom virus?
400
A program that issues commands directly to the disk drivers without going through normal file routines, bypassing not only security restrictions but also leaving no audit trail.
What is superzapping?
400
Replaces certain system calls and utilities with its own, modified versions of those routines.
What is a rootkit?
400
This is a software or hardware-based network security system that controls the incoming and outgoing network traffic and determining whether they should be allowed through or not, based on security policies.
What is a firewall?
400
It is important for organizations to understand these threats and the damage that they can cause and to learn the countermeasures and defences available against them.
What is Malware?