B FOR 204 Lecture Notes - Lecture 2: Botnet, Black Market
BFOR 204 – Spring 2018
Lectures 2
Threats and Malicious Software
Threats
• They harm the confidentiality, integrity and availability of computer asset
Kinds of Threats
Threats and Vulnerabilities
• A threat to a computing system is a set of circumstances that could cause harm.
• A vulnerability is a weakness (in the computing system’s procedures, design, or
implementation) that could be exploited to cause harm.
• A vulnerability is exploited to perpetuate an attack. Attacks can be launched by
humans or systems.
• Malwares are malicious software that exploits the vulnerabilities of a system.
Downloading a malware into a computing system is a threat.
Malware
• Malware can be classified into two broad categories:
o Based first on how it spreads or propagates to reach the desired targets
Threat
Threats with
Natural Causes
Threats with
Human Causes
Benign Intent
Malicious Intent
Random
Directed
find more resources at oneclass.com
find more resources at oneclass.com