threat environment - Answers types of attackers and attacks that companies face
security goals - Answers confidentiality, integrity, availability
confidentiality - Answers people cannot read sensitive information
integrity - Answers attackers cannot change or destroy information
availability - Answers people who are authorized to use information are not prevented from doing so
compromises - Answers successful attacks
countermeasures - Answers tools used to thwart attacks
types of countermeasures - Answers preventative, detective, corrective
sony attack method - Answers sql injection
sql injection - Answers sending modified sql statements through web application to alter how sql
statement is processed
why are employees dangerous - Answers knowledge of systems, permissions to access systems, can
avoid detection, trusted
employee sabotage - Answers destruction of hardware, software, or data
hacking - Answers intentionally accessing a computer resource without authorization or in excess of
authorization
employee financial theft - Answers misappropriation of funds
employee extortion - Answers perpetrator tries to obtain money or other goods by threatening to take
actions that would be against the victim's interest
other internal attackers - Answers contract workers
malware - Answers evil software
viruses - Answers programs that attach themselves to legitimate programs on the victim's machine;
spread primarily by email
worms - Answers stand-alone programs that do not attach themselves to other programs; can jump
from one computer to another without human intervention on the receiving computer
payloads - Answers pieces of code that do damage; implemented by viruses and worms after
propagation