Chapter 8 - Malicious Software Flashcards

1
Q

Malicious software (malware)

A

any program that contains instructions that run on a computer system and perform operations that the user does not intend

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does malware attack all three tenets of cybersecurity

A
  1. Confidentiality - malware can disclose your organization’s private information
  2. Integrity - malware can modify database records, either immediately or over a period of time
  3. Availability - malware can erase or overwrite files or inflict considerable damage to storage media
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

System infectors

A

target computer hardware and software startup functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

File infectors

A

attack and modify executable programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Examples of executable programs

A

COM, EXE, SYS, and DLL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data infectors

A

attack document files containing embedded macro programming capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Lifecycle of a virus

A

Virus is dormant -> the user transmits an infected object to another computer -> the virus locates and infects suitable objects on the new computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Rootkits

A

malware that modifies or replaces one or more existing programs to hide the fact that a computer has been compromised

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Rootkits are…

A

difficult to detect and remove

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Ransomware

A

attempts to generate funds directly from a computer user by limiting access to data through encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Spam

A

consumers computing resources bandwidth and central processing unit (CPU)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why is spam dangerous?

A

Diverts IT professionals from more critical activities and may contain malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Worms

A

self-contained programs designed to propagate from one host machine to another using the host’s own network system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How are worms different from viruses?

A

Unlike viruses, they do not require a host program to survive and replicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Trojan horses

A

programs that masquerade as useful programs while hiding malicious intent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Trojan horses are…

A

the largest class of malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How do trojan horses spread

A

through emails, website downloads, social networking sites, and bots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Logic bombs

A

programs that execute a malicious function of some kind when they detect certain conditions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Logic bombs can…

A

cause immediate damage or can initiate a sequence of events that cause damage over a longer period

20
Q

Logic bombs typically originate from…

A

organization insiders because they have more detailed knowledge of the IT infrastructure

21
Q

Active content

A

dynamic objects that do something when the user opens a webpage

22
Q

Vulnerabilities of active content

A

Users inadvertently download bits of mobile code which gain access to the hard disk and do things like fill up the desktop with infected file icons

23
Q

Add-ons

A

companion programs that extend the web browser

24
Q

Malicious add-ons

A

browser add-ons that contain some type of malware

25
Q

Botnets

A

robotically controlled networks that perform various functions

26
Q

Botnets can be used to…

A

distribute malware and spam; to launch DoS attacks

27
Q

DoS attacks

A

overwhelm a server or network segment to the point that the server or network becomes unusable

28
Q

Distributed denial-of-service attacks (DDoS)

A

use intermediary hosts to conduct the attack

29
Q

Synchronize (SYN) flood attacks

A

attacker uses IP spoofing to send a large number of packets requesting connections to the victim computer

30
Q

Smurf attack

A

attackers forge ICMP echo request packets from remote locations to generate DoS attacks

31
Q

Spyware

A

any unsolicited background process that installs itself on a user’s computer and collects information about the user’s browsing habits and website activities

32
Q

Adware

A

triggers nuisances such as popup ads and banners when a user visits certain websites

33
Q

Why is adware dangerous…

A

Affects productivity and collects and tracks information

34
Q

Phishing

A

tricks users into providing logon information on what appears to be a legitimate website but is actually a website set up by an attacker to obtain this information

35
Q

Spear phishing

A

attacker supplies information about the victim that seems to come from a legitimate company

36
Q

Pharming

A

the use of social engineering to obtain access credentials such as usernames and passwords

37
Q

Keystroke loggers

A

capture keystrokes or user entries and forward the information to the attacker

38
Q

Why are keystroke loggers dangerous?

A

they allow the attacker to capture logon information, banking information, and other sensitive info

39
Q

Homepage hijacking

A

exploiting a browser vulnerability to reset the homepage and then installing a browser helper object trojan program

40
Q

Webpage defacements

A

someone gaining unauthorized access to a web server and altering the index page of a site on the server

41
Q

Phases of an attack

A

Reconnaissance, gaining access, maintaining access, and covering your tracks

42
Q

Defense in depth

A

the practice of layering defenses into zones to increase the overall protection level and provide more reaction time to respond to incidents

43
Q

Application defenses

A

implement antivirus screening, ensure that applications are up to date, install firewalls

43
Q

Operating system defenses

A

deploy change-detection and integrity-checking software, ensure that all operating systems are consistent, disabling unnecessary services

43
Q

Network infrastructure defenses

A

use proxy services, use content filtering, disable any unnecessary network services