Computer security and malware Flashcards

1
Q

Exploit

A

An exploit is software, code, or technique that takes advantage of a vulnerability in a system, application, or network to compromise its security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Zero-day Vulnerability

A

A zero-day vulnerability is a software flaw or security weakness that is previously unknown to the software vendor or developer and has not been patched or fixed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Exploiting Unauthorized Access

A

Exploiting unauthorized access is the act of taking advantage of unauthorized entry into a system to gain privileges or perform malicious activities. It often results from weak passwords or software vulnerabilities. Attackers exploit this access to steal data, disrupt services, or cause harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ransomware Attack

A

Ransomware encrypts files or locks systems, demanding payment for decryption. Spread via phishing emails or malicious links, it renders files unusable until a ransom is paid, typically in cryptocurrency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Rootkit Attack

A

Rootkits exploit system vulnerabilities to gain unauthorized access. They hide from detection, providing attackers with privileged control to execute commands, steal data, or carry out malicious activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Patient’s data confidentiality

A

Encrypting Patient Records
Protect patient data using encryption mechanisms. Only authorized personnel can access sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Patient’s data integrity

A

Digital Signatures for Medical Reports
Ensure the integrity of medical records with digital signatures. Documents cannot be altered without detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Patient’s data availability

A

Redundant Data Backup Systems
Maintain access to patient data with redundant backups. Minimize downtime in case of system failures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Salted hashing

A
  1. Salt Generation: Generate unique salts for each user.
  2. Password Hashing: Hash passwords with salts using a strong algorithm.
  3. Storage: Store hashed passwords and salts in the database.
  4. Verification: Combine entered passwords with salts, hash, and compare
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

State the source and target of the four main attacks that can happen in a containerised system.

A

Container Escape Attack:
Source: Malicious code within a container
Target: Host operating system

Privilege Escalation Attack:
Source: Container runtime or container orchestrator.
Target: Compromise other containers.

Denial-of-Service (DoS) Attack:
Source: Outside traffic
Target: Containers or the entire containerized environment.

Container Breakout Attack:
Source: Container runtime
Target: Host operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Password Decryption Attacks

A

Bute Force Attack:
Tries every possible combination of characters.
Effective against weak keys or short passwords.
Time-consuming process.

Dictionary Attack:
Uses pre-generated lists of common passwords.
More efficient than brute force.
Successful against weak or commonly used passwords.

Rainbow Table Attack:
Utilizes precomputed tables to map encrypted passwords.
Quickly finds matches if encryption algorithm is known.
Efficient with knowledge of encryption parameters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Application Layer Vulnerabilities

A

SQL Injection:
Malicious SQL queries injected.
Exploit database weaknesses.

Cross-Site Scripting (XSS):
Malicious scripts injected into web pages.
Exploit input validation flaws.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Secure Against Application Layer Vulnerabilities

A

Validate and sanitize user input.
Use parameterized queries for SQLi protection.
Encode or sanitize input to prevent XSS.
Train developers on secure coding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Security in SDLC

A
  • Identify security requirements.
  • Threat modeling and risk assessments
  • Integrate security controls and principles into architecture such as authentication and encryption.
  • Secure coding practices.
  • Code reviews and static analysis.
  • Security testing (DAST, SAST).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Native vs Web in terms of Confidentiality, Integrity & Accessibility

A

Fully Native Application:
Confidentiality: Local storage offers better confidentiality but risks unauthorized access if the device is lost.
Integrity: Local data storage provides better integrity but may be compromised if the device is compromised.
Accessibility: Offers offline access but limited accessibility if the device is lost or inaccessible.

Web-Based Application:
Confidentiality: Centralized storage on the server may be more secure, but requires continuous internet connectivity.
Integrity: Relies on server-side security measures, vulnerable to server breaches but less susceptible to local compromises.
Accessibility: Provides ubiquitous access but requires constant internet connection, limiting access in offline environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly