Chapter 6 Securing individual systems Flashcards
(139 cards)
What is malware?
Software that is detrimental to the operation of a host, causing harm or unwanted behavior.
What are the two main functions of a virus?
To replicate and to activate, causing harm or performing some action once triggered.
What is a fileless malware or fileless virus?
Malware that resides in memory and does not rely on files to spread or execute.
What is ransomware (crypto malware)?
Malware that encrypts a user’s data and demands a ransom for the decryption key.
How does a worm differ from a virus?
A worm can replicate itself and spread over networks without user intervention.
What is a Trojan horse?
A program that appears legitimate but performs malicious actions in the background.
What is a Remote Access Trojan (RAT)?
A type of Trojan that allows an attacker to remotely control an infected computer.
What is a backdoor in the context of malware?
A hidden way to bypass normal authentication and gain access to a system.
What are Potentially Unwanted Programs (PUPs)?
Software that may be unwanted by the user, often bundled with other software.
What is a botnet?
A network of infected computers (zombies) controlled by an attacker for malicious activities like DDoS attacks.
What is a keylogger?
Malware that records keystrokes to capture sensitive information like passwords.
What is a rootkit?
Malware designed to gain root access and hide its presence on a system, often installed in the boot sector.
What is a logic bomb?
Malware that triggers a malicious action when certain conditions are met, such as a specific date or number of logins.
What type of attack typically uses botnets?
Distributed Denial of Service (DDoS) attacks.
How can hardware keyloggers be detected?
: They are difficult to detect with software, often requiring physical inspection of the device.
Why are rootkits particularly dangerous?
Because they operate with high-level privileges and can be difficult to detect and remove.
What is the main characteristic of a logic bomb?
It activates based on specific conditions or a timer, causing harm when triggered.
How can Trojans be spread?
Through seemingly legitimate software or files that users download and execute.
Why are PUPs considered a threat?
They can slow down systems, introduce unwanted changes, and potentially lead to further security issues.
What is a weak configuration in cybersecurity?
A setup that presents security risks due to default settings, lack of hardening, or other vulnerabilities.
Why are open Wi-Fi networks considered weak configurations?
Because they allow anyone to connect without authentication, posing security risks, especially in non-public environments.
Why should guest user accounts be disabled if not needed?
They can provide unauthorized access and should be turned off if not required to reduce security risks.
What is the purpose of intruder lockout settings?
To lock out user accounts after multiple failed login attempts, preventing brute force or dictionary attacks.
What is a common issue with permissions that can lead to weak configurations?
Assigning too many permissions, violating the principle of least privilege, and giving users more access than needed.