4. Attacks
Attacks
Acts or actions that exploits vulnerability (i.e., an identified weakness) in controlled system
Accomplished by threat agent that damages or steals organization’s information
Types of attacks
Malicious code: includes execution of viruses, worms, Trojan horses, and active web scripts with intent to destroy or steal information
Hoaxes: transmission of a virus hoax with a real virus attached; more devious form of attack