![]() |
Cyber Security Landscape
|
*** Attack Methods - Malware Attack *** Malicious code is unwanted files or programs that can cause harm to a computer or compromise data stored on a computer. Various classifications of malicious code include viruses, worms, and Trojan horses and malware. Malicious code is unwanted files or programs that can cause harm to a computer or compromise data stored on a computer. Various classifications of malicious code include viruses, worms, and Trojan horses and malware. Worms are a type of virus that self-propagates from computer to computer. Its functionality is to use all of your computer’s resources, which can cause your computer to stop responding. Trojan Horses are computer programs that are hiding a virus or a potentially damaging program. It is not uncommon that free software contains a Trojan horse making a user think they are using legitimate software, instead the program is performing malicious actions on your computer. Malicious data files are non-executable files—such as a Microsoft Word document, an Adobe PDF, a ZIP file, or an image file—that exploits weaknesses in the software program used to open it. Attackers frequently use malicious data files to install malware on a victim’s system, commonly distributing the files via email, social media, and websites Destructive malware is malicious code that is designed to destroy data. Destructive malware impacts the availability of critical assets and data, presenting a direct threat to an organization’s daily operations Organizations should increase vigilance and evaluate their capabilities encompassing planning, preparation, detection, and response for such an event
|
![]() |
Mapped Buisness Risks | ||||||
Brand Damage | Data/Secret Loss | Service Disruption |
Mapped Cyber Risks | ||||||
Data Security / Loss | Extortion | Human Error | Basic Security Hygiene | Identity/Password Protection | Insider Threat |
Mapped Mitigation Methods | ||||||
Limit & Control Access | Protect Data | Manage Risks, Compliance and Controls | Block Threats & Attacks | Manage Threats & Vulnerabilities | Enable Visibility |
Mapped Products | ||||||
Cyberark Alero | Okta Advanced Server Access |
Mapped OEMs | ||||||
Cyberark | Okta |