Page 21 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 21

Manmohan Sharma, Lovely Professional University                                          Unit 2: Threats




                                      Unit 2: Threats                                           Notes


            CONTENTS
            Objectives
            Introduction

            2.1  New Technologies Open Door Threats
            2.2  Level of Threats Information Level and Network Level Threats
            2.3  Threats and Attacks

                 2.3.1  Computer Viruses
                 2.3.2  Trojan Horses
                 2.3.3  Spam
                 2.3.4  Phishing
                 2.3.5  Password Attacks

                 2.3.6  Zombie Computers and Botnets
                 2.3.7  Denial-of-Service Attack (DoS)
            2.4  Classification of Threats and Assessing Damages

            2.5  Summary
            2.6  Keywords
            2.7  Review Questions
            2.8  Further Readings

          Objectives

          After studying this unit, you will be able to:

              Understand the concept of threats
              Discuss new technologies open door threats

              Recognize level of threats
              Explain threats and attacks
              Understand classification of threats and assessing damages

          Introduction

          Any person, act, or object that poses a danger to computer security is called a threat. Any kind of
          policy, procedure, or action that recognizes, minimizes, or eliminates a threat or risk is called a
          countermeasure.
          Threat, is considered as constant.  Any kind of asset that is not working optimally and is mission-
          critical or essential to the organization, such as data that are not backed-up, is called a vulnerability,
          while anything imperfect is called a weakness. Any kind of counter measure that becomes fairly
          automated and meets the expectations of upper management is called a control, and there are
          many types of controls in a computer security environment, as well as threats.



                                           LOVELY PROFESSIONAL UNIVERSITY                                   15
   16   17   18   19   20   21   22   23   24   25   26