Information Assurance 3 Flashcards
the term used to describe a program written to take advantage of a known vulnerability
exploit
the act of using an exploit against a vulnerability
attack
Data is written beyond the limits of a buffer
Buffer Overflow
Force programs to behave in an unintended way
Non-validated Input
Improperly ordered or timed events
Race Conditions
Protect sensitive data through authentication,
authorization, and encryption
Weaknesses in Security Practices
- Access control to physical equipment and resources
- Security practice
Access control to problems
Symptoms of Malware
- Increase in CPU usage
- Decrease in computer speed
- Computer freeze and crashes
- Decrease in Web browsing speed
- Unexplainable problems with network connections
- Files are modified
- Files are deleted
- Presence of unknown files, programs, or desktop icons
- Unknown processes running
- Programs are turning off or reconfiguring themselves
- Email is being sent without the user’s knowledge or consent.
is used to steal data, bypass access control, cause harm to, or compromise a system.
Malware
Infection Methods
- virus
- worm
- trojan
- bot
have the ability to replicate themselves by hooking them to the program on the host computer like songs, videos etc and then they travel all over the internet.
Virus
- their purpose is to conceal themselves inside the software that seems legitimate. Steals information or any other purpose.
- Provide backdoor gateway for malicious programs
Trojan
- advanced form of worms
- Automated processes that are designed to interact over the internet without the need of human interaction
Bots
- Self-replicating in nature but they don’t hook themselves to the program on the host computer.
- Can easily travel from one computer to another.
Worms
malware actions
- adware
- spyware
- ransomware
- scareware
- rootkit
- zombies
display ads computer desktop or inside individual programs
Adware
software that monitors your activities on computer and reveal collected information to interested party.
Spyware
It masquerades as a tool to help fix your system but when the software is executed it will infect your system or completely destroy it. The software will display a message to frighten you and force to take some action like pay them to fix your system.
Scareware
It is type of malware that will either encrypt your files or will lock your computer making it inaccessible either partially or wholly. Then a screen will be displayed asking for money i.e., ransom
Ransomware
Designed to gain root access or we can say administrative privileges in the user system. Once gained the root access, the exploiter can do anything from stealing private files to private data.
Rootkits
They work similar to Spyware. Infection mechanism is same but they don’t spy and steal information rather they wait for the command from hackers.
Zombies
Old Generation Attacks
- Theft of intellectual property
- Identity theft
- Theft of equipment and information
- Sabotage
- Information Extortion
means violation of intellectual property rights like copyrights, patents
Theft of intellectual property