Page 27 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 27

Unit 2: Threats




                                                                                                Notes
                                     Table  2.1: Malicious  Threats
                                            Typical                           Assessing
            Category   Threat   OSI Layer   Definition   Vulnerabilities  Prevention   Detection
                                           Behaviors                          damages
           Malicious   Virus   Application Malicious   Replicates within All computers   Limit   Changes in file Contain, identify
           Software            software that   computer   Common   connectivity.  sizes or   and recover
                               attaches itself to  system,   categories   Limit   date/time   Antivirus
                               other software.   potentially     Boot sector   downloads    stamps    scanners- look for
                               For example, a   attaching itself to   Use only   Computer is   known viruses
                               patched software every software     Terminate   authorized   slow starting   Antivirus
                               application in   application    and Stay   media for   or slow
                               which the   Behavior   Resident   loading data   running    monitors- look for
                                                                            virus related
                               patch’s   categories    (TSR)    and software
                               algorithm is     Innocuous      Application  Enforce   Unexpected or  application
                                                                    frequent
                                                                            behaviors
                               designed to           software       system failures
                               implement the     Humorous    mandatory     Attempt to
                                                     Stealth (or  access
                               same patch on     Data altering     Change of   determine source
                                                     Chameleo)   controls.
                               other                                system   of infection and
                                           Catastrophic      Mutation   Viruses
                               applications,                        date/time    issue alert
                               thereby               engine    generally   Low computer
                               replicating.          Network    cannot run   memory or
                                                           unless host
                                                     Mainframe     increased bad
                                                           application is
                                                           running   blocks on
                                                                    disks
                  Worm   Application  Malicious   Often designed  Multitasking   Limit   Computer is   Contain, identify
                         Network   software which  to propagate   computers,   connectivity,  slow starting  and recover
                               is a stand alone  through a   especially those  employ   or slow   Attempt to
                               application   network, rather  employing   firewalls    running    determine source
                                         than just a single  open network   Worms can   Unexpected or  of infection and
                                         computer   standards   run even   frequent   issue alert
                                                           without a host  system failures
                                                           application
                  Trojan   Application A Worm which  Same as Virus or  Unlike Worms,  User   Same as Virus  Same as Virus
                  Horse        pretends to be a  Worm, but also  which self   cooperation   and Worm   and Worm
                               useful program  sometimes used  propagate,   allows Trojan   Alert must be
                               or a Virus which  to send   Trojan Horses  Horses to   issued, not only
                               is purposely   information back  require user   bypass   to other system
                               attached to a   to or make   cooperation    automated   admins, but to all
                               useful program  information   Untrained users  controls    network users
                               prior to   available to   are vulnerable  User training
                               distribution   perpetrator   is best
                                                           prevention
                  Time Bomb Application A Virus or   Same as Virus or  Same as Virus  Run associated Correlate user  Contain, identify
                               Worm designed  Worm, but   and Worm    anti-viral   problem   and recover
                               to activate at a   widespread   Time Bombs   software   reports to find   Attempt to
                               certain   throughout   are usually   immediately   patterns   determine source
                               date/time   organization   found before   as available   indicating   of infection and
                                         upon trigger date  the trigger date   possible Time  issue alert
                                                                    Bomb
                  Logic   Application A Virus or   Same as Virus or  Same as Virus  Same as Virus  Correlate user  Contain, identify
                  Bomb         Worm designed  Worm   and Worm   and Worm   problem   and recover
                               to activate under                    reports   Determine source
                               certain                              indicating   and issue alert
                               conditions                           possible Logic
                                                                    Bomb
                  Rabbit   Application  A Worm   Rabbit consumes  Multitasking   Limit   Computer is   Contain, identify
                         Network   designed to   all CPU cycles,   computers,   connectivity,  slow starting  and recover
                               replicate to the   disk space or   especially those  employ   or running    Determine source
                               point of   network   on a network   firewalls   Frequent   and issue alert
                               exhausting   resources, etc.         system failures
                               computer
                               resources
                  Bacterium  Application A Virus   Operating   Older versions  Limit write   Changes in OS Antivirus
                               designed to   System   of operating   privileges and  file sizes,   scanners: look for
                               attach itself to   consumes more  systems are   opportunities  date/time   known viruses
                               the OS in   and more CPU   more   to OS files    stamps    Antivirus
                               particular (rather cycles, resulting  vulnerable than   System   Computer is   monitors: look for
                               than any   eventually in   newer versions   administrators  slow in   virus related
                               application in   noticeable delay  since hackers   should work   running    system behaviors.
                               general) and   in user   have had more   from non-  Unexpected or
                               exhaust   transactions   time to write   admin
                               computer            Bacterium   accounts   frequent
                                                                    system failures
                               resources,                  whenever
                               especially CPU              possible
                               cycles
           Spoofing   Spoofing   Network   Getting one   Spoofing   Automation   Limit system  Monitor   Disconnect
                                                                                 Contd...
                         Data Link  computer on a   computer often  services   privileges of   transaction   automation
                               network to   doesn’t have   designed for   automation   logs of   services until
                               pretend to have  access to user   network   services to   automation   patched or
                               the identity of   level commands  interoperability  minimum   services,   monitor
                               another   so attempts to   are especially   necessary    scanning for   automation
                               computer,   use automation  vulnerable,   Upgrade via   unusual   access points,
                                           LOVELY PROFESSIONAL UNIVERSITY
                               usually one with  level services,   especially those   such as network       21
   22   23   24   25   26   27   28   29   30   31   32