467_Flashcards
What is malware as defined by NIST 800-83?
A program inserted into a system, usually covertly, to compromise confidentiality, integrity, or availability of data, applications, or operating systems.
What is an Advanced Persistent Threat (APT)?
A well-resourced, persistent attack using various technologies and malware, often state-sponsored, targeting specific businesses or political entities.
What are the main classifications of malware propagation mechanisms?
Infected content (viruses), vulnerability exploit (worms), and social engineering (spam emails, Trojans).
What is a virus?
Malware that replicates itself into executable code and propagates when the infected code is executed.
What is a worm?
A program that spreads independently by exploiting vulnerabilities and often carries a payload.
What is a Trojan horse?
Malware that appears legitimate but contains harmful hidden functionality, such as spyware or keyloggers.
What are botnets used for?
Activities such as DDoS attacks, spamming, sniffing sensitive data, and installing additional malware.
What is ransomware?
Malware that encrypts user data and demands payment for the decryption key.
What is a logic bomb?
Code that triggers a payload when specific conditions are met.
What is the difference between a rootkit and a backdoor?
A rootkit hides its presence and provides admin access, while a backdoor is an entry point bypassing security checks.
What is a phishing attack?
A social engineering attack where victims are tricked into revealing sensitive information by mimicking trusted sources.
What is a macro virus?
A virus that uses macro or scripting code in documents to execute and spread.
What is a drive-by-download attack?
Malware installation through a compromised website without user consent.
What are the four generations of anti-virus software?
1) Signature-based scanners, 2) Heuristic scanners, 3) Activity traps, 4) Full-featured protection.
What is sandbox analysis?
Executing potentially malicious code in a controlled environment to analyze its behavior.
What is a hash function?
A function that converts a variable-length input into a fixed-size output called a hash value.
What are the key properties of a cryptographic hash function?
Preimage resistance, second preimage resistance, and collision resistance.
What is preimage resistance?
The property that makes it computationally infeasible to find an input x given its hash value h.
What is collision resistance?
The property that makes it computationally infeasible to find two distinct inputs x and y such that H(x) = H(y).
What is the main application of a message digest?
To provide message authentication by verifying data integrity.
What is a digital signature?
A mechanism where the hash value of a message is encrypted with a private key to ensure authenticity and integrity.
What are simple hash functions, and why are they insecure?
Functions like XOR-based hashing are prone to collisions and insufficient for secure applications.
What is the birthday paradox in the context of hash functions?
The probability of finding a collision is significant after approximately √2^m inputs for an m-bit hash value.
What is the Secure Hash Algorithm (SHA)?
A family of cryptographic hash functions designed by NIST, including SHA-1, SHA-2, and SHA-3.