Security A to Z the most important terms

Similar documents
Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

Security workshop Protection against botnets. Belnet Aris Adamantiadis Brussels 18 th April 2013

Spyware: Securing gateway and endpoint against data theft

Stopping zombies, botnets and other - and web-borne threats

What keep the CIO up at Night Managing Security Nightmares

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY

State of the Web 2015: Vulnerability Report. March Menlo Security Alright Reserved

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Computer Security DD2395

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

Malware & Botnets. Botnets

Managing Web Security in an Increasingly Challenging Threat Landscape

How To Protect Your Online Banking From Fraud

Whitepaper on AuthShield Two Factor Authentication with ERP Applications

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

Endpoint & Server Protection. Brent Biernat First Vice President Network Services May 13, 2014

Operation Liberpy : Keyloggers and information theft in Latin America

Secure Your Mobile Workplace

Top five strategies for combating modern threats Is anti-virus dead?

Current counter-measures and responses by CERTs

Before the DEPARTMENT OF COMMERCE Internet Policy Task Force

DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest

Countermeasures against Bots

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Types of cyber-attacks. And how to prevent them

ITAR Compliance Best Practices Guide

F-Secure Anti-Virus for Mac 2015

Cisco Protects Internal Infrastructure from Web-Based Threats

White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services

Protection for Mac and Linux computers: genuine need or nice to have?

Innovations in Network Security

Top tips for improved network security

Detailed Description about course module wise:

Network attack and defense

F-Secure Anti-Virus for Mac. User's Guide

Web 2.0 and Data Protection. Paul Tsang Security Consultant McAfee

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks

Global IT Security Risks: 2012

2012 Bit9 Cyber Security Research Report

Security Engineering Part III Network Security. Intruders, Malware, Firewalls, and IDSs

Spyware. Summary. Overview of Spyware. Who Is Spying?

GOING BEYOND BLOCKING AN ATTACK

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

INVESTIGATIONS REPORT

The evolution of virtual endpoint security. Comparing vsentry with traditional endpoint virtualization security solutions

Indian Computer Emergency Response Team (CERT-In) Annual Report (2010)

Current Threat Scenario and Recent Attack Trends

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

INFOCOMM SEC RITY. is INCOMPLETE WITHOUT. Be aware, responsible. secure!

Symantec enterprise security. Symantec Internet Security Threat Report April An important note about these statistics.

AB 1149 Compliance: Data Security Best Practices

Data Center security trends

Looking Behind the Attacks - Top 3 Attack Vectors to Understand in 2015

Cyber Essentials Scheme

white paper Malware Security and the Bottom Line

WEB ATTACKS AND COUNTERMEASURES

Threat Events: Software Attacks (cont.)

Windows Malware Annual Report 2014 And prognosis 2015

More Computer Hints and Tips

Practical tips for a. Safe Christmas

Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus

Sound Business Practices for Businesses to Mitigate Corporate Account Takeover

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Securing small business. Firewalls Anti-virus Anti-spyware

About Botnet, and the influence that Botnet gives to broadband ISP

Christos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus

Practical guide for secure Christmas shopping. Navid

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

Botnets: The Advanced Malware Threat in Kenya's Cyberspace

A Network Administrator s Guide to Web App Security

BotNets- Cyber Torrirism

Topic 1 Lesson 1: Importance of network security

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Don t Fall Victim to Cybercrime:

ACS-3921/ Computer Security And Privacy. Lecture Note 5 October 7 th 2015 Chapter 5 Database and Cloud Security

Cybersecurity Kill Chain. William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime

Malware B-Z: Inside the Threat From Blackhole to ZeroAccess

10 Smart Ideas for. Keeping Data Safe. From Hackers

TLP WHITE. Denial of service attacks: what you need to know

Marble & MobileIron Mobile App Risk Mitigation

Protect your network: planning for (DDoS), Distributed Denial of Service attacks

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses

Internet threats: steps to security for your small business

All-in-one coverage for your business

Overview. Common Internet Threats. Spear Phishing / Whaling. Phishing Sites. Virus: Pentagon Attack. Viruses & Worms

DDoS Attacks Can Take Down Your Online Services

Seminar Computer Security

Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant

Countermeasures against Spyware

Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall

Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers

Information Security Threat Trends

Comparing Two Models of Distributed Denial of Service (DDoS) Defences

GlobalSign Malware Monitoring

THE EASY WAY TO SECURITY AND SIMPLICITY. Business Suite

IBM Protocol Analysis Module

IBM Security Strategy

Transcription:

Security A to Z the most important terms Part 1: A to D

UNDERSTAND THE OFFICIAL TERMINOLOGY. This is F-Secure Labs. Learn more about the most important security terms with our official explanations from F-Secure Labs. Part 1: A to D 2

A ADWARE Adware is F-Secure s classification name for software that displays advertisements on the computers or devices. The advertisements may be displayed on the desktop or during a web browsing session. Adware is often bundled with free software that provides some functionality to the user. Revenue from the advertising is used to offset the cost of developing the software, which is therefore known as ad-supported. ATTACK SURFACE Code that is active in a target system and somehow involved in processing input that can be used in attacks. Any vulnerabilities that can be exploited are part of attack surface. The basic idea in security is to disable all unnecessary features in software, and thus limit attack surfaces. Disabling code in this manner prevents it from being exploited - even if it contains a vulnerability. ATTACK VECTOR Method of contact used to attack victims. Examples of typical attack vectors include email, the web, and USB media. BACKDOOR B A remote administration utility that bypasses normal security mechanisms to secretly control a program, computer or network. These utilities may be legitimate, and may be used for legitimate reasons by authorized administrators, but they may also be misused by attackers. A backdoor is usually able to gain control of a system because it exploits vulnerabilities, bugs or undocumented processes in the system s code. BANKING FRAUD / TROJAN Malware that attackers use to access their victim s online banking. BRUTE-FORCE ATTACK A type of attack that typically targets authentication mechanisms such as passwords. A brute-force attack is an exhaustive, trial-and-error attempt that involves rapidly cycling through a comprehensive list of possible passwords or decryption keys, until the correct one is entered. Brute-force attacks commonly succeed due to weak passwords and/or human error or laxness. Often, a brute-force attack is combined with a dictionary attack, which uses a long list of words taken from dictionaries and popular culture references. Unlike a standard brute-force attack, a dictionary attack uses words that are thought to be the most likely to succeed. BOTNET A network of devices infected with a specialized form of malware known as a bot that can be remotely controlled by an attacker, usually via a command-and-control (C&C) server. Each infected computer may be known as a bot, a zombie computer, or a zombie. An attacker, or group of attackers, can harness the collective resources of a botnet to perform major malicious actions, such as sending millions of spam emails, launching a distributed denial-of-service (DDoS), attack and much more. 3

C CLIENT / ENDPOINT PC/Mac workstation or laptop, or a mobile phone. Basically anything that runs code, and capable of running security software. The basic definition of a client is a device that can run independent applications, while a terminal is just a screen that input access to computer that is somewhere else. CLOUD SECURITY Security that is provided from a remote server. The benefit of cloud security is that a remote server receives information from multiple sources, so it can make better decisions. Another security benefit of cloud security is that attackers cannot reverse engineer security features that are implemented at remote cloud server. CYBER ATTACK Cyber attacks target computerized infrastructure, and can therefore produce affects outside of the computing domain. Effects are what define cyber attacks, not methods. If a denial-of-service attack against a bank website crashes payment processing servers, and prevents people from paying for things with credit cards or withdrawing money from an ATM, it is a cyber attack. An attack against a hobby game server may be technically identical, but if it only affects that particular game, it would not be considered a cyber attack. COMMAND AND CONTROL / C2 The command and control(c&c, or CC) server of a botnet is the main control point for the entire network of enslaved computers. CYBER ESPIONAGE Espionage using computers as tools for espionage. It typically involves hacking or using malware to break into corporate computers and stealing information. CYBER SECURITY Security that focuses on preventing cyber attacks. Basically the same as information security, except that one should also consider the effects that attackers can produce once they have control of corporate systems and build custom security mechanisms for critical resources. A typical example would be restricting the network connections for workstations with access to a corporate bank account, or a production line controller computer, etc. Cyber security is also used by less honest consultants as a way to rename everything that used to be called information security in order to charge bigger fees from customers. 4

DATA BREACH An incident that involves data leaking from an organization as the result of a successful attack. DDOS A type of attack conducted over the Internet, using the combined resources of many computers to bombard, and frequently crash, a targeted computer system or resource (e.g., a program, website or network). There are various types of distributed denial-of-service (DDoS) attacks that can be conducted in different ways based on how the attack is conducted. DDoS attacks are sometimes included as part of a worm or trojan s payload - all infected computers are directed to attack the selected target. DDoS attacks are also often performed by botnets, as the combined resources of all the computers in the botnet can generate a terrific amount of data, enough to overwhelm most target s defenses within seconds. DDoS attacks have become one of the more dangerous menaces of the modern Internet. DLP Data Leakage Prevention - a software or service used to detect and possibly prevent information/ data breaches. D DOMAIN A domain name (e.g. www.f-secure.com) is a human-friendly text string given to identify a specific resource on the Internet in most cases, a website. Each domain name maps to a specific IP address. Domain names are used because IP addresses, which are what the computers use to identify common resources, aren t easy for humans to remember. Domain names are a part of the hierarchical Domain Name System (DNS) used to organize all resources on the Internet. DRIVE-BY DOWNLOAD The automatic download of a program from a visited website onto a user s computer, almost always without their knowledge or authorization. Drive-by downloads are often used in conjunction with Search Engine Optimization (SEO) attacks, in which search engine results are poisoned in order to redirect users to a malicious site where the drive-by attack can take place. The term drive-by download is most frequently used to describe the situation of a website forcibly and silently downloading malware on to a visitor s system, but clicking on pop-up ads or viewing an email message may also result in the user being subjected to this attack. 5

Learn more about F-Secure Labs on our website. WEBLOG - LATEST FROM THE LABS Updates on research done by F-Secure Labs, and views on the latest developments in information security and digital technology. GET SOLUTIONS & GET INFORMED Find a solution for a security concern with one of our free tools, or learn more about threats and products in our descriptions and advisories. 1 REMOVAL TOOLS Use these free tools to scan and remove malicious programs. 2 THREAT DESCRIPTIONS Details of threats identified by F-Secure Labs. 3 SECURITY ADVISORIES Details and fixes of all the vulnerabilities affecting F-Secure products. 6 Copyright 2014-2015 F-Secure All rights reserved.