1.4 Cyber-attack Techniques and Types Flashcards
1
Q
Exploit
A
A small piece of software code, part of a malformed data file, or a sequence (string) of commands that leverages a vulnerability in a system or software.
2
Q
Malware
A
- Viruses
- Worms
- Trojan horses
- Ransomware
- Anti-AV
- Logic bombs (specific condition)
- Back doors
- Rootkits (root access)
- Spyware and adware
3
Q
Characteristics and capabilities of advanced malware
A
- Distributed, fault-tolerant architecture
- Multi-functionality
- Polymorphism and metamorphism
- Obfuscation
4
Q
Creation of an exploit data file
A
- Embed a small piece of malicious code within the data file.
- Memory corruption that allows the attacker’s code to be inserted into the execution flow of the vulnerable software.
5
Q
Most common delivery methods for Malware
A
Spam and Phishing emails (45 - 75%)
6
Q
Spam and Phishing
A
- Spear phishing (more widely used)
- Whaling
- Watering hole (compromise website)
- Pharming (DNS poisoning)