631 Flashcards
the steps in the malware removal process are as follows —
ID Malware
Quarantine
Disable system restore
Remediate infected system.
Update or install anti-malware software.
Scan and use removal techniques (safe mode, pre-installation environment). Schedule scans, and run updates.
Enable System Restore, create a restore point
Educate the end user.
Antivirus software should be installed, but must also be kept —
up-to-date with virus definition files.
Most antivirus applications protect against viruses, worms, and Trojan horses. Some antivirus applications also have integrated —
antimalware and antispyware software.
You should only have one anti-virus application installed and —
running on your computer.
Antimalware software should also be installed and kept up-to-date. Like antivirus applications, antimalware applications require periodic —
updates to the malware definition files.
For antispyware software, follow the same guidelines as with antivirus and antimalware software. Unlike antivirus application, you can install multiple —
antispyware applications.
Hyperlink spoofing, which is also referred to as Web spoofing, is used by an attacker to persuade the Internet browser to connect to a —
fake server that appears as a valid session.
The primary purpose of hyperlink spoofing is to gain access to confidential information, such as —
PIN numbers, credit card numbers, and bank details of users.
The link from hyperlink spoofing as it appears on this page is often correct. However, the actual underlying link is usually to the —
spoofed site.
Hyperlink spoofing takes advantage of people using hyperlinks instead of DNS addresses. In most scenarios, the DNS addresses are not visible, and the user is redirected to another fake — .
Web site after clicking a hyperlink
A land attack involves sending a spoofed TCP SYN packet with the target host’s IP address and an open —
port acting both as a source and a destination to the target host on an open port.
The land attack causes the system to either freeze or crash because the machine —-
continuously replies to itself.
ICMP packet spoofing is used by a smurf attack to conduct a
denial-of-service (DoS) attack.
A smurf is a DoS attack that uses spoofed broadcast ping messages to
flood a target host.
In such an attack, the attacker sends a large number of ICMP echo packets with a spoofed source IP address similar to that of the target host to IP broadcast addresses. This results in the target host being —
flooded with echo replies from the entire network. This also causes the system to either freeze or crash.