INFORMATION SECURITY AND AUDIT
SOLVED PRACTICE QUESTIONS

INTRUSION

Intrusion refers to unauthorized access or activities on a computer system or network. This can involve a variety of actions such as accessing sensitive data, installing malware, disrupting services, or compromising system integrity.

Types of Intrusions

  1. Unauthorized Access: Gaining access to systems or data without permission.
  2. Malware: Installing malicious software to damage or gain control of systems.
  3. Data Breaches: Accessing and exfiltrating confidential information.
  4. Denial of Service (DoS): Disrupting services to make them unavailable to legitimate users.
  5. Phishing and Social Engineering: Manipulating individuals to gain access to systems or information.

Examples of Intrusions

  • Data Breach: Unauthorized access to and theft of sensitive data, such as the Equifax breach in 2017.
  • Ransomware Attack: Malware that encrypts files and demands a ransom for decryption, like the WannaCry attack in 2017.
  • Advanced Persistent Threat (APT): A prolonged and targeted cyberattack where an intruder remains undetected for an extended period, often to steal data.