Cisco 2 Flashcards
usually introduced by errors in the operating system or application code, despite all the effort companies put into finding
Software vulnerabilities
- are often introduced by hardware design flaws. RAM memory for example, is essentially capacitors installed very close to one another. It was discovered that, due to proximity, constant changes applied to one of these capacitors could influence neighbor capacitors.
- are specific to device models and are not generally exploited through random compromising attempts
Hardware vulnerabilities
Categorizing Security Vulnerabilities
- buffer flow
- non-validated input
- race conditions
- weakness in security practices
- access-control problems
his vulnerability occurs when data is written beyond the limits of a buffer. Buffers are memory areas allocated to an application.
Buffer overflow
Programs often work with data input. This data coming into the program could have malicious content, designed to force the program to behave in an unintended way
Non-validated input
- Systems and sensitive data can be protected through techniques such as authentication, authorization, and encryption.
- Developers should not attempt to create their own security algorithms because it will likely introduce vulnerabilities.
- It is strongly advised that developers use security libraries that have already created, tested, and verified.
weaknesses in security practices
This vulnerability is when the output of an event depends on ordered or timed outputs. A race condition becomes a source of vulnerability when the required ordered or timed events do not occur in the correct order or proper timing.
Race conditions
process of controlling who does what and ranges from managing physical access to equipment to dictating who has access to a resource, such as a file, and what they can do with it, such as read or change the file. Many security vulnerabilities are created by the improper use of access controls.
Access-control problems
Types of Malware
- spyware
- adware
- bot
- ransomware
- scareware
- rootkit
- trojan horse
- worms
- man-in-the-middle
- man-in-the-mobile
- This malware is design to track and spy on the user.
- often includes activity trackers, keystroke collection, and data capture. In an attempt to overcome security measures, spyware often modifies security settings.
Spyware
- dvertising supported software is designed to automatically deliver advertisements.
- is often installed with some versions of software.
- designed to only deliver advertisements but it is also common for adware to come with spyware.
Adware
From the word robot, a bot is malware designed to automatically perform action, usually online. While most bots are harmless, one increasing use of malicious bots are botnets.
Bot
This malware is designed to hold a computer system or the data it contains captive until a payment is made
Ransomware
his is a type of malware designed to persuade the user to take a specific action based on fear.
Scareware
This malware is designed to modify the operating system to create a backdoor. Attackers then use the backdoor to access the computer remotely
Rootkit
malicious executable code that is attached to other executable files, often legitimate programs
Virus
malware that carries out malicious operations under the guise of a desired operation. This malicious code exploits the privileges of the user that runs it
Trojan horse
malicious code that replicate themselves by independently exploiting vulnerabilities in networks
Worms
allows the attacker to take control over a device without the user’s knowledge. With that level of access, the attacker can intercept and capture user information before relaying it to its intended destination.
Man-In-The-Middle (MitM)
type of attack used to take control over a mobile device. When infected, the mobile device can be instructed to exfiltrate user-sensitive information and send it to the attackers.
Man-In-The-Mobile (MitMo)
two categories of malware
- infectious methods
- malware actions
infectious methods
- worms
- virus
- trojan
- bots
malware on basis of actions
- adware
- ransomware
- spyware
- scareware
- rootkits
- zombies
they dont steal or spy but wait for instructions from hackers
zombies