Domain 3: System vuln, threats, countermeasures | Web Architecture Flashcards
Emanations
energy that escapes electrical systems. Can be used to reverse engineer processes/data.
Covert Channel
any comms that violate sec. policy.
covert storage channels
Use shared storage, to allow two subjects to signal each other. can be coded or not.
Covert timing channels
Uses system clock to infer sensitive infor.
Backdoor
shortuct into a system allowing auser to bypass security.
Maintenance hook
intentional backdoor installed typically in the prototyping process. should always be removed.
Virus
Doesn’t spread automatically. Requires a carrier (usually human).
Macro virus
Written in macro language - such as Word or Excel
Boot sector virus
Infets the boot sector so that the virus starts on pc start up.
Stealth virus
hides itself from OS and antivirus software
Polymorphic virus
Changes its’ signature every time it enters a new system.
Multipartite virus
spreads via multiple vectors
Worm
malware that Spreads automatically
Trojan
Malware that hides itself as a benign app - like a game.
rootkit
replaces portions of the kernel and/or os.
Kernel rootkit -operates in ring 0
OS rootkin - operates in ring 3