Identification should consider that threats are constantly emerging and evolving and could include the following:
- Malware
- Spyware
- Viruses
- Worms
- Trojans
- Rootkits
- Ransomware
- Phishing
- Spear phishing
- Spoofing
- Social engineering
- Shoulder surfing
- Zero-day attack
- Zombie/botnet
- Brute forcing
- Dictionary attacks
- Non-compliant systems
- Violations of security best practices
- Tailgating
- Man-in-the-middle
Process/Skill Questions:
- What distinguishes malware from malicious people on the Internet?
- What social engineering would be effective on a department store as opposed to a military base?
- How does a zero-day attack differ from one that is a month old?
- What additional risks do non-compliant systems present in a LAN?
- What additional risks are inherent in bring your own device (BYOD) policies?