Ch21 Flashcards
what are the four main virus propagation techniques
file infection
service injection
boot sector infection
macro infection
what are rootkits used for and how to protect against them
rootkits are used to escalate priviledges and regular software patching will protect against rootkits
why should developers of web applications use database stored procedure
limit the ability of the application to execute arbitrary code because with stored procedures, the
SQL statement resides on the database server and may only be modified by database administrators.
Cross‐site scripting attacks are successful only against web applications that include
reflected input
highly sophisticated worm designed to destroy nuclear enrichment centrifuges attached to Siemens controllers.
Stuxnet