Chapter 3: Threat Factors - Computers as Targets Flashcards

1
Q

What are the 3 Phases of Convergence?

A

1) Separate the people
2) Leverage technology
3) Replace people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Explain “Separate People” as it r/t Convergence?

A
  • Aka sneakerware because people had to physically take a floppy disk or other external hard drive & walk to a computer to transfer a malware onto the computer
  • First Macintosh virus, Elk Cloner, was part of a video game for computers inserted via a floppy disk
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain “Leverage Technology” as it r/t Convergence?

A
  • Fraudsters developed the first email born viruses, such as the ILOVEYOU & the Melissa virus, which spread via email attachments
  • Code Red attacked Microsoft computer systems & spread to other systems by using HTTP requests
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain “Replace People” as it r/t Convergence?

A

People do not have to be physically present in one country to spy out information on computers in other country; in stead, they can infiltrate computers & steal information by using computer programs such as Trojan horses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the main targets in Information Technology?

A

1) Software
2) Hardware
3) Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are examples of Attacks on Software?

A
  • Infected download links of software or software updates
  • Malicious apps
  • Drive-by downloads
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are examples of Devices for Software?

A

o Computers
o Computer networks
o Smart devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are examples of Countermeasures for Software?

A

o Anti-virus software
o Security patches
o Data backup
o Software screening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are examples of Attacks on Hardware?

A
  • Manufacturing backdoors
  • Backdoor creation
  • Access to protected memory
  • Hardware modification
  • Inducing faults
  • Counterfeiting products
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are examples of Devices for Hardware?

A

o Access control systems
o Network appliances
o Industrial control systems
o Surveillance systems
o Components of communication infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are examples of Countermeasures for Hardware?

A

o Tightly control production
o Use detection measures to discover compromised hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are examples of Attacks on Network?

A
  • Denial-of-service attacks
  • The Man in the Middle
  • Browser
  • Brute Force
  • SSL
  • Scan
  • Domain Name Servers
  • Backdoor
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are examples of Devices for Networks?

A

o Computers
o Modem
o Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are examples of Countermeasures for Networks?

A

o Network-based mitigation
o Host-based mitigation
o Proactive measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the 3 main issues Cybersecurity is concerned with?

A

1) Confidentiality
2) Integrity
3) Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the 3 Threat Clusters?

A

1) Technological
2) Socio-political
3) Human-machine

17
Q

What is the Technological Cluster?

A

Computers are the target of the cybercrime – mainly malware, such as viruses & worms

18
Q

What is the Socio-political Cluster?

A

Includes crimes where computers are used as a tool, such as phishing or identity theft

19
Q

What is the Human-machine Cluster?

A

Focuses on computer infrastructure & vulnerabilities created through our dependence on computers & networks

20
Q

What are the 2 functions that malware fulfills?

A

1) Spreads itself
2) Causes damage

21
Q

How does malware spread itself?

A

Via email attachments embedded in web pages, file sharing, infected CDs or DVDs, or by scanning a computer or network for exploitable vulnerabilities

22
Q

How does malware cause damage?

A
  • Trivial damage – message that pops up on the screen every time the user starts the computer
  • Debilitating – destroying files, taking the computer hostage, stealing data & passwords to facilitate other crimes (identify theft)
  • Other damages: computer as a slave to send spam to other documents, to host illegal data, to attack other computers, or to extort others
23
Q

What are the 5 main reasons for the increase in threats to mobile devices?

A

1) Increase in smartphones
2) Android devices & open-source technology
3) Users store more information on these devices
4) Hardware has become more sophisticated
5) Programming software more similar to PCs

24
Q

What are the 3 main forms of malware?

A

1) Computer viruses
2) Worms
3) Trojan horses

25
What is a Virus?
Small software program designed to spread from one computer to another and to interfere with computer operation
26
What are the 3 main types of Viruses?
1) Shell viruses 2) Add-on viruses 3) Intrusive viruses
27
What do Shell Viruses do?
Form a shell around the original code & the original host program w/ the purpose to take over the functions of the host program
28
What do Add-On Viruses do?
* Attach to the original code, changing the startup information of the program * Viral code then executes before the original code, interfering w/ the program that the user attempts to run
29
What do Intrusive Viruses do?
Overwrite the original code, which can make the host program dysfunctional
30
What are Advanced Persistent Threats (APT)?
Virus - * Cyber attacks executed by sophisticated & well-resourced adversaries targeting specific information in high-profile companies & governments, usually in a long-term campaign involving different steps
31
What are the 5 risks created by Viruses?
1) Disable computers 2) Send spam 3) Provide access to computer & information on the computer 4) Steal personal information 5) Hijack the user's web browser
32
What is a worm?
A self-replicating virus that does not alter files but resides in active memory and duplicates itself