BOOK: Ch 6, 7, 10 Flashcards
Malware propagation mechanisms include those used by…(3)
viruses, worms and Trojans
______ include system corruption, bots, phishing, spyware, and rootkits.
Payloads
Virus Dormant Phase
The Virus is Idle.
Virus Propagation Phase
The virus places a copy of itself into other programs orinto certain system areas on the disk.
Virus Triggering Phase
The virus is activated to perform the function for which it was intended.
Virus Execution Phase
The function is performed. The function may be harmless, such as a message on the screen, or damaging, such as the destruction ofprograms and data files.
Infects files with macro or scripting code that is interpreted by an application.
Macro Virus
Infects files that the operating system or shell consider to be executable.
File Infector Virus
An attack, that exploits social engineering to leverage user’s trust by masquerading as communications from a trusted source
Phishing Attack
The recipients are carefully researched by the attacker, and each e-mail is carefully crafted to suit its recipient specifically, often quoting a range of information to convince them of its authenticity.
Spear-Phishing Attack
Is a set of programs installed on a system to maintain covert access to thatsystem with administrator (or root) privileges, while hiding evidence of its presenceto the greatest extent possible.
Rootkit
An attempt to compromise availabilityby hindering or blocking completely the provision of some service.
Denial-of-service (DoS) attack
DDoS Flooding attack targets…(3)
Network BW, System resources, Application resources
The ICMP echo responsepackets generated in response to a ping flood using randomly spoofed source addresses is a good example.
Backscatter Traffic
This attacks the ability of a network server to respond to TCP connection requests by overflowing the tables used to manage such connections.
DoS attach, SYN Spoofing Attack