Chapter 21: Malicious Code and Application Attacks Flashcards
___ viruses use more than one propagation technique in an attempt to penetrate systems that defend against only one method or the other.
Multipartite
____ viruses hide themselves by actually tampering with the operating system to fool antivirus packages into thinking that everything is functioning normally.
Stealth
___ viruses actually modify their own code as they travel from system to system.
Polymorphic
____ viruses use cryptographic techniques to avoid detection
Encrypted
_____ are malicious code objects that infect a system and lie dormant until they are triggered by the occurrence of one or more conditions such as time, program launch, website logon, certain keystrokes, and so on.
Logic bombs
a software program that appears benevolent but carries a malicious, behind-the-scenes payload that has the potential to wreak havoc on a system or network
Trojan horse
they propagate themselves without requiring any human intervention.
Worms
____ monitors your actions and transmits important details to a remote system that spies on your activity.
Spyware
It uses a variety of techniques to display advertisements on infected computers.
Adware
____ is a type of malware that weaponizes cryptography. After infecting a system through many of the same techniques used by other types of malware, it then generates an encryption key known only to the author and uses that key to encrypt critical files on the system’s hard drive and any mounted drives. This encryption renders the data inaccessible to the authorized user or anyone else other than the malware author.
Ransomware
_____ vulnerabilities exist when a developer does not properly validate user input to ensure that it is of an appropriate size.
Buffer overflow
In a ____ SQL injection attack, the perpetrator sends input to the web application that tests whether the application is interpreting injected code before attempting to carry out an attack.
content-based blind