Computer Misuse Flashcards

1
Q

List legislation related to computer misuse. Describe what each does.

A

Computer Misuse Act 1990
- made it illegal to gain unauthorised access to a computer; unauthorised access with the intent to commit further crimes; unauthorised access with the intent to modify content

Police and Justice Bill 2006

  • amended Computer Misuse Act 1990
      • made it illegal to build any attack toolkits
      • increased the penalty for a computer misuse offense from 6 months to 12 months

EU Directive on Security of Network and Information Systems 2016
- united, transnational approach to cyber crime to achieve a high level common security by:

  • EU level cooperation
  • logging and reporting any incidents
  • increased cybersecurity capabilities at a national level
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define malware

A

malicious + software = malware
a program that is COVERTLY installed on a device that attacks DATA, APPLICATIONS, PROGRAMS, OS.
Data - damages it and compromises its integrity and confidentiality
RUNS intrusive and destructive programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How is a malware classified?

A

By payload and how it propagates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does APT stand for and what is it?

A

Advanced Persistent Threats

  • > advanced = sophisticated and a variety of malware tools
  • > persistent = attacks one target, usually political, repeatedly over a long time
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the different components of a virus?

A

An infection vector
Trigger
Payload (what it does, besides spreading)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe a typical life cycle of a virus.

A

Dormant phase
Propagation phase
Triggering phase
Execution phase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How is it classified?

A

By target

or concealment strategy (polymorphic, metamorphic, encryption)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a worm?

A

A malicious program that actively seeks a machine to infect and use as a launchpad for further attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the different types of worms?

A
Polymorphic 
Metamorphic 
Multi-exploit 
Multi-platform 
Ultrafast 
Zero day exploits (exploiting known vulnerability to achieve maximum surprise and distribution)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does a worm spread?

A
  • Email/IM
  • File sharing
  • Remote execution -> remote log in access/ remote file access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly