21. Using Best Practices Flashcards
3 types of viruses?
- Program viruses
- Macro viruses
- Worms
What are program viruses?
Code snippets that integrate into other programs or scripts
When the application is executed, the virus code becomes active.
What are macro viruses?
Viruses exploiting Microsoft Office macros
Microsoft macros are small programs or scripts written in the Visual Basic for Applications (VBA) language.
What are worms?
Network-exploiting viruses residing in memory
like email,
What is a drive-by download?
Malware installed on a user’s device without consent or knowledge
often simply by visiting a compromised website or clicking on a malicious link.
What is a virus vector?
The route by which malware infects a computer
i.e. opening links in unsolicited email, infection from another compromised machine on the same network, etc.
What is cross-site scripting (XSS)?
Malicious scripts injected into webpages to harm user’s browsers or steal data
i.e. 1 technique is to spawn a pop-up window when a user visits a genuine banking site to try to trick them into entering their credentials through the pop-up.
What is pharming?
Attempts to redirect web traffic to a counterfeit page
This is usually done by corrupting the way the computer resolves the website name used in the web address to the IP address of a particular server.
What is a service pack?
Collection of updates, fixes, & patches for a software product
Typically on an OS or app suite
Microsoft products like Windows have a lifecycle policy: 5 years of mainstream support, 5 years of extended support for security updates. You need the latest Service Pack for support, and non-updated versions get 24 months after its release.
How do antiviruses identify infected files?
Using definitions/signatures of known virus code
What is an Access Control System?
Technical controls that govern how subjects may interact with objects
What is a Subject in an access control systems?
Anything that can request & be granted access to a resource
i.e. Users or software processes
What are Objects in access control systems?
Resources
i.e. networks, servers, databases, files, etc.
What is an Access Control List (ACL)?
List of subjects & the permissions they have on the object
4 main processes on an access control system?
- Identification
- Authentication
- Authorization
- Accounting
4 comon ways ACLs are implemented?
The different ways they’re implemented determine how users receive rights
- Discretionary Access Control (DAC)
- Role-based Access Control (RBAC)
- Mandatory Access Control (MAC)
- Rule-based
How does DAC operate?
By giving authority to the owner
Ownership can be transferred. Owner has full control over the resource, allowing them to modify its ACL to grant rights to others
How does RBAC control access?
By assigning roles with specific permissions to users
You can see a simple version of RBAC working in the division of Windows user account types into Administrators and Standard Users.
How does MAC (Mandatory Acces Control) control access?
By assigning security clearance levels to objects & users
Users can access objects at or below their clerance level in hierarchial or within the same domain in compartmentalized setups, adhering to the “Need to Know” principle.
what does rule-based access control refer to?
Access control models based on system-enforced rules
Users do not determine the rules
RBAC, MAC, and continuous authentication exemplify rule-based access control. For instance, Windows User Account Control (UAC) prompts user confirmation for privileged actions, safeguarding against hijacking attempts.