B FOR 204 Lecture Notes - Lecture 2: Botnet, Black Market

34 views3 pages
BFOR 204 Spring 2018
Lectures 2
Threats and Malicious Software
Threats
They harm the confidentiality, integrity and availability of computer asset
Kinds of Threats
Threats and Vulnerabilities
A threat to a computing system is a set of circumstances that could cause harm.
A vulnerability is a weakness (in the computing system’s procedures, design, or
implementation) that could be exploited to cause harm.
A vulnerability is exploited to perpetuate an attack. Attacks can be launched by
humans or systems.
Malwares are malicious software that exploits the vulnerabilities of a system.
Downloading a malware into a computing system is a threat.
Malware
Malware can be classified into two broad categories:
o Based first on how it spreads or propagates to reach the desired targets
Threat
Threats with
Natural Causes
Threats with
Human Causes
Benign Intent
Malicious Intent
Random
Directed
find more resources at oneclass.com
find more resources at oneclass.com
Unlock document

This preview shows page 1 of the document.
Unlock all 3 pages and 3 million more documents.

Already have an account? Log in

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents