Chapter 6 Flashcards

1
Q

one of the most significant categories of threats to computer systems

A

malware/malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

a program that is inserted into a system with the intent of compromising the confidentiality, integrity or availability of the victim’s data

A

malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

infection of existing executable or interpreted content by viruses that is subsequently spread to other system

A

Propagation mechanism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

preformed by malware once it reaches a target system can include corruption

A

Payload action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

it includes a variety of propagation mechanisms and payload modules that even novices can combine,select and deploy

A

crimeware/toolkits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

is prominent, recent, example of such attack kit

A

Zeus crimeware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

is a piece of software that can infect other programs by modifying them

A

computer virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

computer virus has three parts:

A
  • Infection mechanism
  • Trigger
  • Payload
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

the means by which a virus spreads or propagates, enabling it to replicate

A

Infection mechanism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The event or condition that determine or delivered when the payload is activated

A

Trigger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What the virus does, besides spreading.

A

Payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Four phases of typical virus

A
  • Dormant phase
  • Propagation phase
  • Triggering phase
  • Execution phase
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

virus classification by target

A
  • Boot sector infector
  • File infector
  • Macro virus
  • Multipartite virus
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

virus classification by concealment

A
  • Encrypted virus
  • Stealth virus
  • polymorphic virus
  • Metamorphic virus
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Creates copies during replication that are functionally equivalent but have distinctly different bit patterns

A

Polymorphic virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The portion of the virus that is responsible for generating keys and performing encryption/decryption is referred to as the _____

A

mutation engine

17
Q

is a program that actively seeks out more machines to infect, and then each infected machine serves as an automated launching pad for attacks on other machines

A

Worm

18
Q

Worm Replication

A
  • Email or IM
  • file sharing
  • remote execution capability
  • Remote file access or transfer capability
  • Remote login capability
19
Q
  • first fucntion in the propagation phase for a network worm

- searches for other systems to infect

A

Scanning/fingerprinting

20
Q

Scanning strategies that a worm can use

A
  • Random
  • Hit-list
  • Topological
  • Local Subnet
21
Q
  • Well-known Worm infection

- it was designed to spread on UNIX systems and used a number of different techniques for propagation

A

The Morris worm

22
Q

NImda worm used variety of distribution methods:

A
  • Email
  • Windows shares
  • Web Server
  • Web clients
  • Backdoors
23
Q

the state of the art in worm technology:

A
  • Multiplatform
  • Multi-exploit
  • Ultrafast spreading
  • Polymorphic
  • Metamorphic
  • Transport Vehicles
  • Zero-day exploit
24
Q

this refers to programs that can be shipped unchanged to heterogeneous collection of platforms and execute with identical semantics

A
  • Mobile code