1.2 Flashcards

1
Q

Malware types

A

To gather keystrokes,

to control com and install into a bot and have that com to join the bad bot net,

For advertisment

For random ware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Virus

A

Malware can reproduce but needs user to start process

Program virus launches by clicking
Boot sector virus, starts when start OS
Script virus
Macro virus in apps
Fileless virus, stealth attacks and can evade scanners, written to memory not Hd, comes from clicking links

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Worms

A

No user input needed. Takes advantage of vulnerability or network connectivity. Can spread quickly, can be stopped with firewall to stop communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ransomware crypto-malware

A

Taking valuable personal or corporate data, restricting that data and require some payment for unlocks

Crypto malware encrypts info that requires a key for recovery

How to protect?
Backups on a offline location
Updates full security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Trojans and rats

A

Fake software looking like the real software. Once installs makes back doors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Potentially unwanted programs (pup)

A

Undesired software installed with other software such as a back up utility, browser hijacker’s or unwanted bookmark bar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Remote access Trojan

A

Entering through back door, to gain complete control remotely and control anything’s, collect logs, copy files, run more malware and programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Rootkit

A

Modifies in kernel of operation system, the building blocks the foundations for the OS. combo rootkit and malware
To both impossible delete and then take important info

Secure boot protects this

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AdwareSpyware

A

Adware Com becomes one big ad banner, slowing computer, can be installed with other
Programs.

Spyware taking capture browsing habits, key logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Bots and botnets

A

Infects OS through Trojan or PUp and connects to other computers via a command and control server. Then the whole system working together can create a DDos, proxies for spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Logic. Bomb

A

Usually someone with a grudge or ex emoloyee like a time bomb that
Triggers at a certain time or user
Event. Difficult to identify.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Password attacks

A

An app that stores pw and gets hacked.

Best to hash

Example a spraying attack such as using common passwords for a quick check

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Brute force attack

A

Uses all combinations of password to find the match. Works with username and password hashes as well. They will create their own hash to determine if it matches the hash of the hash they hacked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Dictionary attack

A

Uses common words and checks passwords against possible combos with password letter substitutions as well.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Rainbow table

A

Uses a lot of hashes from previously to cross check any existing known hashes

Can add salt to hashes to make similar
Passwords with diff hashes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Physical attacks

A

Usb cable with HID (fake keyboard) once connected cable takes over and takes over com

Malicious flash drive with a hidden HID can even act as an Ethernet adapter for networking

17
Q

Skimming

A

Stealing credit card info as we use it with skipping strip and possible pin button press

Can use card cloning and cvc but not the chips

18
Q

Supply chain attacks

A

Manufacturing of raw materials suppliers, customers etc.

19
Q

Cloud based attacks

A

Cloud is all centralized with full control. Has large scale and easy To update.

20
Q

Cryptographic attack examples

A

Using the encrypted data to decrypt as it goes From point a to point b

Ex birthday attack, working as a hash collision, where to of the same hashes to determine if a collision exists to determine the key

Ex downgrade attack where the system downgrades to an easy to break encryption