Attack Vectors Flashcards

1
Q

What is a virus?

A

A computer virus is a type of malicious software, or malware that spreads between computers and causes damage to data and software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How is a virus spread?

A

Viruses spread through malicious code which can get into a system, modify it, and spread it to other computers. A virus can spread itself by attaching it to legitimate programs or documents that support macros which enable it to execute its code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What damage can viruses cause?

A

Viruses can steal passwords and sensitive data, corrupt or delete files, slow down performance or even crash the entire system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a boot sector virus?

A

A virus that takes control when you start you computer and can spread via infected USB drives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a polymorphic virus?

A

A virus that changes its code to avoid detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a direct action virus?

A

A virus that is activated by opening downloaded files or programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is XSS?

A

XSS is a type of security vulnerability that can occur in web applications and websites. XSS attacks involve injecting malicious JavaScript code into a web application, which can then be executed by other users when they enter the site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can XSS vulnerabilities occur?

A

XSS vulnerabilities occur when a web application or website adopts user supplied input into the page without properly validating or encoding the input which allow attacks to inject their own code into the site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What damage can XSS attacks cause?

A

Attackers can steal cookies and impersonate users, steal personal information like usernames, passwords and credit card information, alter the content of websites to spread misinformation and redirect users to malicious websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a reflected XSS attack?

A

Reflected attacks are those where the injected script is reflected off the web server, such as in an error message. Reflected attacks are delivered to the victim via another route, such as in an email or on another website. When a user clicks a malicious link or browses a malicious website, the injected code travels to the vulnerable website which reflects the attack onto the users browser which will execute the code because it came from a trusted source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a stored attack?

A

Stored attacks are attacks where the injected script is permanently stored on the target servers, such as in a database or a message forum. The victim then retrieves the malicious script from the server when it requests the stored information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a worm?

A

A worm is a type of malware that can replicate itself and spread across a network of devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How can worms be spread?

A

Worms can be spread via email attachments, instant messaging, software vulnerabilities, shared access and clicking links.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What damage can worms cause?

A

Worms can overload systems by consuming large amounts of bandwidth and memory, exploit vulnerabilities in security software, steal sensitive information, change, delete and corrupt files and install backdoors that allow access to the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an email worm?

A

Email worms use emails to spread, often by disguising themselves as attachments. When an unsuspecting user opens an email and downloads the attachment, the virus is released into the system. The first worm distributed via the internet, the Morris worm was of this type.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a net worm?

A

Net worms do not require a host system to propagate, instead they exploit software vulnerabilities in the OS of a computer connected to the internet. Once they infiltrate a system, they can spread to other computers via network connections, causing widespread havoc.

17
Q

What is an instant messaging worm?

A

Instant messaging worms use instant messaging apps to spread. They send copies of themselves to the infected users contact list, allowing them to spread their malicious code rapidly among networks of individuals. The recipient often receives a message laced with enticing links or attachments, which when clicked or opened results in the worm infecting their system.

18
Q

What is phishing?

A

Phishing is when attacks send scam emails that contain links to malicious websites.

19
Q

What damage can phishing cause?

A

Phishing can lead to unauthorised purchases, stolen funds, identity theft, damaged reputations, damaged credit scored, installation of malwares on a victims device and disruption to business operations, networks and data.