CompTIA Security+ Flashcards
Each piece of Malware has 2 steps
Propagation and Payload
What is the propagation method of a Virus?
Spreads by human action. User education can prevent this.
What is the propagation method of a worm?
Spread by themselves. Best way to defend is to update and patch.
What is the propagation method of a Trojan horse?
Disguise themselves as good programs. Act as advertised when run. Deliver a payload behind the scenes. App control provides a good defence.
What is a RAT?
A remote access trojan. It allows attackers to control systems.
What are the kinds of payloads that can be delivered?
Adware, Spyware, Ransomware
What are the characteristics and mechanisms of Adware?
Malware that displays advertisements.
- Changing the default search engine
- Displays pop up advertisements
- Replacing legitimate ads with other ads
What are the characteristics and mechanisms of Spyware?
Gathers information without the user knowing.
- Logging keystrokes
- Monitoring Web Browsing
- Searches hard drives and cloud storage
What are the characteristics and ways to prevent Ransomware?
Blocks access until the ransom is paid
- Anti Malware Software
- Security patches
- User Education
What types of malicious code are there?
Backdoors, Logic bomb, Advanced Malware, Rootkits (User Mode and Kernal mode), Polymorphic viruses, Armoured Viruses, Botnets, Advanced persistent threats.
What are advanced persistent threats?
Well funded, highly skilled groups that are typically government sponsored. They have access to zero days and sophisticated weapons
What is ethical disclosure
Disclosing to the vendor when you have discovered a vulnerability.
How would you differentiate between adversaries?
Internal and External attackers, Level of sophistication, access to resources, motivation, intent
What kind of hackers are there?
Script Kiddies, Hactivists, organised crime, competitors, Nation states
How to you prevent against insider threats?
Implement HR practices: Background checks, principal of least privilege, Separation of duties, Mandatory holidays.
Behavioural indicatiors: Taking work materials home, interest in issues outside of responsibility, duplication of materials, strange network access patterns, using personal hardware.
What is a denial of service attack?
Making a resource unavailable for long periods of time, sends huge numbers of requests to a server, hard to distinguish between legit requests.
What are the limitations of DOS attacks?
Require a substantial amount of bandwidth, easy to block.
What is a DDOS attack?
Distribution denial of service (DDOS) is a DOS attack that leverages a botnet to overwhelm a target.
What is a smurf attack?
Where the attacker sends echo requests to the broadcast address of a 3rd party server using a fake source address. The fake address is actually the real IP of the victim.
What is am amplified DDOS attack?
The attacker choses requests that have very large responses so they can send in lots of very small requests and generate a lot of noise on the other side.
What is the amplification factor?
The degree to which the attack increases in size - Reply/Request=Amplification.
What is an eavesdropping attack?
There is where the attacker relies on a compromised communications path (which is done with Network device tapping, ARP poisoning or DNS poisoning) to listen in.
What is a man in the middle attack?
The attacker tricks the system during the initial communication using DNS or ARP poisoning to force the user to connect directly with the attacker, then the legitimate server. The user however connects with a fake server and the attacker acts as the relay. MITM browser attacks exploit flaws in browsers and plugins.
What is a replay attack?
Uses previously captured data such as encrypted authentication tokens to create a separate connection to the server which is authenticated but doesn’t involve the end user.