1.2 Flashcards

Given a senario, analyze potential indicators to determine the type of attack

1
Q

Malware

A

Malicious software, can do anything from gathering keystrokes, controlling affected pcs, to showing advertisements, and encrypting your data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Virus

A

Malware that can reproduce itself, but it requires the user to execute the program that contains the virus. It than reproduces the filesystem or network to reproduce and spread.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Program Virus

A

Virus that is part of an application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Boot sector virus

A

Virus that lives in the boot sector of the storage device. It starts when the OS is started.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Script Vrius

A

Operating system and browser based scripts, powershell ext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Macro Virus

A

Common in Microsoft Office apps, utalizes macros at startup of application. Hides in simple files like xml, docs, ext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Fileless virus

A

A stealth attack, doesn’t actually save to the storage drive. It instead operates souley in the memory of the PC. Usually from clicking a malicious link on a website, then it exploits a flash/java/windows vulnerability. It than launches powershell and downloads payload in ram.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Worms

A

Malware that self-replicates, uses network as transmission. Can do so without user activation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Ransomware

A

A type of malware attack that holds your data ransom, sometimes by just making the user think they are locked out from their data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Crypto-malware

A

A newer generation of ransomware that makes your data unavailable by encrypting your data until you provide cash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Protect Against Ransomeware

A

1) Always have a backup - ideally offline
2) Keep operationg system up to date
3) Keep aplications up to date
4) Keep antivirus/anti malware up to date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Trojan Horse

A

A software that pretends to be something else

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Potentially Unwanted Program (PUP)

A

Often installed along with other software, many different types that include intrusive toolbars, adware, ext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Remote Access Trojans (RATs)

A

Aka Remote Administration Tool, gives attacker administrative control of a device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Rootkits

A

Modifies core system files part of the kernel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Finding and removing rootkits

A

Secure boot with UEFI adds additional boot security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Adware

A

May cause performance issues, especially over the network by spamming your pc with ads. Often times they are PUPs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Spyware

A

Malware that spies on you, usually it is a trojan horse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Bots

A

Once your machine it becomes a bot, used by an attack usually alongside other infected other bots from the C&C server (Command and Control)

20
Q

Botnets

A

A group of bots working together, often times utilizing a Distributed Denial of Service attack (DDos)

21
Q

Logic Bomb

A

Waits for a predefined event and issues a command. Often left by someone with a grudge.

22
Q

Plaintext/ Unencrypted password

A

Some applications store passwords “in the clear” Never store passwords as plaintexts

23
Q

Hashing a password

A

Hashes represents data as a fixed-length string of text

24
Q

Brute force

A

Try every possible password combination until the has is matched. It either attacks a password at a login prompt - which is harder as it will usually get locked out after a few attempts -, or by obtaining the password hash.

25
Q

Spraying Attack

A

Tries to login with a list of common passwords on many accounts. Fewer attempts on more accounts.

26
Q

Dictionary Attacks

A

Use a dictionary to find common words, many common wordlists available. Some are customized by language or line of work - and also preform letter substitutions (p@$$w0rd)

27
Q

Rainbow Table

A

An optimized, prebuilt set of hashes. Saves time because the hash chains are pre-calculated. This greatly cuts down on the time it takes to crack a password as it just needs to lookup the hashes instead of calculating them.

28
Q

Salting Hashes

A

Salt is a bit of random data added to the password before the password is hashed. This can make two passwords that are the same have different hashes because of the random data added to the calculation. This is a great method to defend against rainbow tables.

29
Q

Malicious USB Cable

A

A physical attack that uses a normal looking USB cable that contains some additional components inside. Often time tells the PC that it is an input device, and then uses that to type commands into the PC without the user’s knowledge. To defend against this, only use USB cables from known trusted sources.

30
Q

Malicious flash drive

A

Physical attack that uses a normal looking flash drive. Similar to a Malicious USB cable, has additional components that allow it to input commands to a PC by acting as a HID (human interface device). It may also contain virus within the files on the USB, act as a boot device to infect the computer on boot, or act as an ethernet adapter and redirects traffic requests.

31
Q

Skimming

A

Stealing credit card information during normal transactions. Attackers will copy data from the magnetic stripe or from the machine logging the purchase. Often times, it will include a small camera to watch for pin # input. To defend, check the physical card reader and look for signs of tampering.

32
Q

Card Cloning

A

Gets card details from a skinner, and then duplicates the card. Would only be able to use magnetic stripe cards, as the chips on cards cannot be duplicated. Cloned gift cars are the most common occurrence.

33
Q

Machine Learning

A

Computers are getting smarter by utilizing Machine Learning (ML). It requires a lot of data to train the computers, but they will get better over time with more data.

34
Q

Poisoning the Training Data

A

Attackers send modified data to confuse the Artificial Intelligence (AI) with the intention of making the AI to behave incorrectly.

35
Q

Evasion Attacks

A

AI is only as good as the training and programming. Attackers will target holes and limitations, and will often time change their attacks once the holes are filled.

36
Q

Securing Learning Algorithms

A

Check training data, constantly retrain with new data, and train the AI with possible poisoning methods.

37
Q

Suppply Chain

A

Attackers will infect vulnerabilities along the supply chain and abuse the fact that companies will trust their supply chain.

38
Q

Supply Chain Security

A

Use trusted it infrastructure equipment, cut down on number of suppliers, and strict controls over policies and procedures.

39
Q

Categories for IT Security

A

Cloud based & on premises.

40
Q

On Premises Security

A

Full control over everything in house, and a local team can ensure everything is secure. No waiting for support as checks can occur at any time, but security changes may take additional time and cost.

41
Q

Cloud based Security

A

Data is in a security environment, but third party may have access to data. Cloud providers have more experience managing large scale security, so the biggest security risk is on users to follow best practices. Cloud security options are scalable but may not be as customizable.

42
Q

Cryptographic Attacks

A

Attackers will try to find vulnerabilities to crack into cryptographic security. The problem often lies in the implantation over the cryptographic methods themselves.

43
Q

Birthday Attack

A

Utilizes the birthday paradox to find hash collisions, where to different plaintexts passwords would create the same hash value. To protect against this, you can use a large hash output size.

44
Q

Hash Collisions

A

Hash digests are supposed to be unique, and different input data should never create the same hash.

45
Q

Downgrade Attack

A

Instead of using perfectly good encryption, the systems are forced to downgrade into a vulnerable encryption method.