Chapter 9 - Malware, Vulnerabilities and Threats Flashcards
How does Spyware differ from Malware?
page 300
Works actively on behalf of a third party. Rather than self replicating, like viruses and worms, spyware is spread to machines by users who inadvertently ask for it.
What are rootkits?
page 301
Software programs that have the ability to hide certain things from the operating system.
What are Trojan Horses?
page 305
Programs that enter a system or network under the guise of another program. Could create a backdoor or replace a valid program during installation.
What are logic Bombs?
page 307
Programs or code snippets that execute when a certain predefined event occurs.
What are the two Definitions of Backdoors?
page 308
- Originally referred to troubleshooting and developer hooks into systems that often circumvented normal authentication.
- Second refers to gaining access to a network and inserting a program or utility that creates an entrance for an attack.
What are software running on infected computers called zombies often known as?
page 309
Botnet
What are often delivered through a Trojan, takes control of a system and demands that a third party be paid?
page 309
Ransomware
- The “control” can be accomplished by encrypting the hard drive, by changing user password information, or via any of number of other creative ways.
What are the different types of Virus classifications?
page 310
- Polymorphic - Stealth
- Retrovirus - Multipartite
- Armored - Companion
- Phage - Macro
What are the different types of viruses?
page 313
- Armored - Polymorphic
- Companion Virus - Phage
- Macro Virus - Retro virus
- Multipartite Virus - Stealth
What is Spam?
page 316
Defined as any unwanted, unsolicited email and not only can the sheer volume of it be irritating, but it can also often open the door to larger problems.
What are some of the reasons attackers have for initiating an attack?
page 319
- They might be doing it for sheer fun of it.
- They might be criminals attempting to steal from you
- They might be individuals or groups who are using the attack to make a political statement or commit an act of terrorism
What are some of attacks of DoS, DDoS?
page 319
- Deny access to information, applications, systems, or communications.
- Bring down a website while the communications and systems continue to operate.
- Crash the operating system
- Fill the communications channel of a network and prevent access by authorized users.
- Open as many TCP sessions as possible; this type of attack is called a TCP SYN flood DoS attack
What is a Spoofing Attack?
page 321
Is an attack by someone or something to masquerade as someone else., usually an access attack.
What are the most popular spoofing attacks today?
page 321
- IP spoofing
- ARP Spoofing
- DNS SPoofing
What is Spear Phishing?
page 323
A unique form form of phishing in which the message is made to look as if it came from someone you know and trust as opposed to an informal third party.