Browse Definitions :

Answers: Top 10 consumer threats to the enterprise

1. This type of Internet application allows end users to read and write personal email at work. What is it?

Answer: webmail

The Black Hat conference is a popular venue for demonstrating webmail flaws.

Web Application Attacks Learning Guide

 2. This term describes the practice of copying data from a computer onto a personal storage device such as a USB drive, PDA or iPod. What is it?

Answer: podslurping

Your data may be your most precious asset. Do you really want to see next season's software, industrial design or previous intellectual property walk out the door? To protect against podslurping and other network intrusions targeting individual computers, experts recommend that administrators develop and enforce effective endpoint security policies.

Topic: Endpoint Security
Learn how to build, implement and maintain secure procedures for keeping your network safe from potentially insecure laptops, desktops, PDAs and other endpoint machines.


 3. This real-time communication technology can unwittingly become an "instant" security threat. What is it?

Answer: instant messaging

Threats: Instant messaging (IM) security risks, especially the potential for data leaks and policy breaches, are the biggest reasons businesses and organizations need to secure their IM clients. Security Expert Michael Cobb, in this Q&A, writes that:

"As one of the most widely deployed applications on the Internet, instant messaging, or IM, has increasingly become a target for attackers. Threats range from IM-borne viruses, worms, SPIM (spam over IM), malware and phishing attacks. Unfortunately, controlling the use of IM within an organization is quite difficult."
Read the rest of Cobb's answer

IM security address both risks and compliance requirement.

Review how to secure instant messaging.

Then, try your hand at this short IM quiz from to see if you've internalized what you've learned.

 4. This feature, found even in the lowest-end cell phone, could be used for corporate spying. What is it?

Answer: picture messaging in camera phones

Disgruntled employees taking pictures of confidential documents? Prototypes showing up in the background of Facebook photos and blogs? Scary. Perhaps more significant, however, is the possibility that in order to send and receive images, users will disable image filters on Outlook, allowing image spam and phishing attacks to slip through.

Camera phones: Snapping at workplace privacy? 
Gartner: A camera phone ban is shortsighted 

 5. Now that these portable organizational devices have large amounts of memory and wireless connectivity, there are many new ways for data to escape and for malware to sneak in. What are they?

Answer: PDAs & smartphones

Threats: Unless you've been holding onto your old Palm, the odds are that your current PDA is a BlackBerry or Treo. Losing them may be the primary concern but viruses can be transferred onto the corporate server when they synchronize.

BlackBerry vulnerability, mobile viruses are real threats 
BlackBerry Security 
White Paper: CIO Guide to Mobile Security
Weekly Security Planner: Your PDA/PED Policy

 6. This peer-to-peer VoIP service may be free and easy to use, but hackers have been caught trying to exploit its vulnerabilities. What is it?

Answer: Skype

According to security expert Mike Chapple, "There are certainly some security concerns related to using services like Skype on an enterprise network. Specifically, Skype does not publish the details of its security controls, and some traffic may take place in an unencrypted fashion. Therefore, I would not recommend using the technology for confidential information."
Read the rest of Chapple's discussion of Skype dangers

High-risk flaws in Skype
Skype Trojan: Much ado about nothing?
IM, Skype, P2P open security holes: Survey 
Can Skype phones threaten an enterprise network? 
Skype: Its dangers and how to protect against them

 7. Downloadable desktop _____ that display weather forecasts or stock quotes have become quite popular with end users. Unfortunately, they can also provide a backdoor to your network. What are they?

Answer: desktop widgets

Attackers have already discovered how to exploit a flaw in Yahoo!'s Widgets to run malicious code on compromised Windows computers. Few users realize that downloading, installing and running these small applications may open up a vulnerability -- and administrators may not see the issue until it's too late.

Widgets: The next big security threat?
Are desktop gadgets a target for hackers?
Security update fixes Yahoo Widgets flaw 

 8. Enterprise applications delivered through the cloud using this software distribution model are vulnerable to Web-based attacks. What is the software model?

Answer: SaaS applications

Threats: Web applications of any sort, including SaaS apps, are exposed to a wide variety of threats and potential vulnerabilities that can put an entire enterprise at risk. Whether it's the method used is cross-site scripting, command injection, path traversal attacks or buffer overflows, compromised SaaS applications are bad news for everyone.

Web Application Attacks Learning Guide
SaaS apps being deployed by business units, not IT
What You Don't Know About SaaS
Burton cautions architects on SaaS

 9. Employees attending a seminar in this popular virtual world can bring back more than just a bag of swag. What is it?

Answer: Second Life

While phishing or identity theft scams are still in their infancy in the context of 3-D virtual worlds, the software and updates that the software client frequently requests aren't just a drag on network resources. Like widgets, automatic updates can be used by hackers to bring malware into the user's PC.

Second Life a security risk for businesses, Gartner cautions
Web services and Second Life
Second Life job fairs boost IT prospects

 10. Where would you find a worm on your wall? Facebook. This type of networking site is an increasingly popular target for malware distributors. 

Answer: social networking

Threats: Social networking sites so far have been hit mostly by annoying worm, adware and phishing attacks.
Read the rest of Ed Skoudis' explanation of social networking dangers

What are the risks of social networking sites? 
Black Hat 2007: Researchers demonstrate webmail, social networking flaws
Hackers planning cyberwar on social networking sites 
Social-networking sites rife with wormable flaws 
Social networking gone bad

This was last updated in August 2008
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • threat modeling

    Threat modeling is a procedure for optimizing application, system or business process security by identifying objectives and ...

  • distributed denial-of-service (DDoS) attack

    A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a ...

  • social engineering

    Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into ...

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • bare-metal cloud

    Bare-metal cloud is a public cloud service that offers dedicated hardware resources without any installed operating systems or ...

  • race condition

    A race condition is an undesirable situation that occurs when a device or system attempts to perform two or more operations at ...

  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted ...