Common Threats Flashcards

1
Q

What types of software require protection beyond just applications?

A

Operating systems, utilities, drivers, and Application Program Interfaces (APIs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why is infrastructure security important for application security?

A

Applications run on hardware and networks, making their security dependent on the security of these underlying elements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What infrastructure management areas are relevant to security?

A

Management of networks, storage, and database interfaces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What challenge arises when dealing with older systems?

A

Integration with legacy systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Besides software, what other components need to be secure for system security?

A

Hardware, the network, databases, and physical security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is meant by the ‘attack surface’?

A

All the possible points or vectors through which software could be attacked or compromised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

List some examples of elements that make up a software’s attack surface.

A

Implementation methods, vendor/administrator accounts, networks, wireless communications, unused features, connected systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Can connecting to external services (like advertisers) create risks?

A

Yes, if the external service provider is compromised, it can lead to the compromise of systems connected to it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the two broad categories used to classify threats?

A

Internal and external threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are examples of internal threats?

A

Mistakes (user or admin), software bugs, software flaws, unhappy/malicious employees, system misconfigurations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the difference between a software bug and a software flaw?

A

A bug is a syntactical problem (error in the code itself), while a flaw is a semantic problem (error in the logic of the software).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What common internal issue was cited as a major cause of past breaches?

A

Mistakes made by IT departments or administrators, such as misconfiguring systems or leaving accounts unprotected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Who are some examples of external human attackers?

A

Hackers, criminals, agents engaged in espionage, and hacktivists.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are common motivations for external attackers?

A

Financial gain (e.g., ransomware), ego/recognition, espionage, or advancing a specific ideology (hacktivism).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is malware?

A

Software specifically written with the intention to do harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does malware differ fundamentally from a software bug?

A

Malware is created with malicious intent, whereas a bug is an unintentional mistake in the code or logic.

17
Q

Name several types of malware mentioned.

A

Viruses, worms, logic bombs, ransomware, Trojan horses, rootkits, Remote Access Trojans (RATs).

18
Q

How does a Trojan horse typically work?

A

It disguises malicious code within seemingly legitimate or desirable software (like a game or utility) that a user downloads.

19
Q

What is the primary goal of a rootkit?

A

To gain root-level (administrator or highest privilege) access to a system, allowing full control.

20
Q

What is a botnet?

A

A network of robotically-controlled, compromised computers.

21
Q

What are botnets commonly used for?

A

Launching denial-of-service attacks, distributing spam, and potentially other coordinated malicious activities.

22
Q

What are examples of operational attack vectors mentioned?

A

Compromising tools used for remote meetings or learning systems; using social media to spread malicious links or spam.

23
Q

What does APT stand for?

A

Advanced Persistent Threat.

24
Q

What characterizes an APT?

A

Attackers are highly skilled, persistent (determined and don’t give up easily), and pose a significant threat.

25
Q

Who typically perpetrates APTs?

A

Historically state-sponsored groups, but now also includes sophisticated criminal organizations.

26
Q

What is the suggested approach for dealing with determined APTs?

A

Focus on containing and limiting damage, and monitoring systems to detect breaches quickly, as prevention might be impossible.

27
Q

Are accidental events considered threats?

A

Yes, if they are unwanted actions that may result in harm to operations or systems.