Domain 3: System vuln, threats, countermeasures | Web Architecture Flashcards
Emanations
energy that escapes electrical systems. Can be used to reverse engineer processes/data.
Covert Channel
any comms that violate sec. policy.
covert storage channels
Use shared storage, to allow two subjects to signal each other. can be coded or not.
Covert timing channels
Uses system clock to infer sensitive infor.
Backdoor
shortuct into a system allowing auser to bypass security.
Maintenance hook
intentional backdoor installed typically in the prototyping process. should always be removed.
Virus
Doesn’t spread automatically. Requires a carrier (usually human).
Macro virus
Written in macro language - such as Word or Excel
Boot sector virus
Infets the boot sector so that the virus starts on pc start up.
Stealth virus
hides itself from OS and antivirus software
Polymorphic virus
Changes its’ signature every time it enters a new system.
Multipartite virus
spreads via multiple vectors
Worm
malware that Spreads automatically
Trojan
Malware that hides itself as a benign app - like a game.
rootkit
replaces portions of the kernel and/or os.
Kernel rootkit -operates in ring 0
OS rootkin - operates in ring 3
Packers
utility that provides compression of executables. Can be used to avoid signature based detection.
Logic bomb
malicious program that triggers when a logical condition is met. i.e time, number of transactions, number of cpu cycles, etc.
Antivirus software
signature based or heuristic based
server side attacks
Launched from an attacker to a server.
client side attack
when a victim/user downloads malicious content.
WEb architecture and attacks
As the web becomes more complex - the attack surface also gets larger.
Applets
small pieces of mobile code that are embedded in other software like web browsers.
Java
Applet form sun microsystems.
runs in sandbox increases functionality of web browser
ActiveX
microsoft version of java
OWASP
open web app security project
XML
extensible markup language
SOA
service oriented architecture.
Intends to reduce application architecture down to a functional unit of service.
polyinstantiation
allows two different objects to have the same name in a database.
Inference and aggregation
attacker uses lower level access to learn restricted info.
data mining
searches large sets of data to look for patterns.
Data analytics.
Used by sec professionals to understand normal operations.
countermeasures
defense in depth. multiple overlapping controls
mobile device attacks
used to carry malware into a secure area.
mobile device defense
clearly defined byod policies.
remote wipe
ability to remotely wipe a company device