Information Assurance 3 Flashcards

1
Q

the term used to describe a program written to take advantage of a known vulnerability

A

exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

the act of using an exploit against a vulnerability

A

attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data is written beyond the limits of a buffer

A

Buffer Overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Force programs to behave in an unintended way

A

Non-validated Input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Improperly ordered or timed events

A

Race Conditions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Protect sensitive data through authentication,
authorization, and encryption

A

Weaknesses in Security Practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • Access control to physical equipment and resources
  • Security practice
A

Access control to problems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Symptoms of Malware

A
  1. Increase in CPU usage
  2. Decrease in computer speed
  3. Computer freeze and crashes
  4. Decrease in Web browsing speed
  5. Unexplainable problems with network connections
  6. Files are modified
  7. Files are deleted
  8. Presence of unknown files, programs, or desktop icons
  9. Unknown processes running
  10. Programs are turning off or reconfiguring themselves
  11. Email is being sent without the user’s knowledge or consent.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

is used to steal data, bypass access control, cause harm to, or compromise a system.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Infection Methods

A
  1. virus
  2. worm
  3. trojan
  4. bot
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

have the ability to replicate themselves by hooking them to the program on the host computer like songs, videos etc and then they travel all over the internet.

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • their purpose is to conceal themselves inside the software that seems legitimate. Steals information or any other purpose.
  • Provide backdoor gateway for malicious programs
A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • advanced form of worms
  • Automated processes that are designed to interact over the internet without the need of human interaction
A

Bots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  • Self-replicating in nature but they don’t hook themselves to the program on the host computer.
  • Can easily travel from one computer to another.
A

Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

malware actions

A
  1. adware
  2. spyware
  3. ransomware
  4. scareware
  5. rootkit
  6. zombies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

display ads computer desktop or inside individual programs

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

software that monitors your activities on computer and reveal collected information to interested party.

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

It masquerades as a tool to help fix your system but when the software is executed it will infect your system or completely destroy it. The software will display a message to frighten you and force to take some action like pay them to fix your system.

A

Scareware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

It is type of malware that will either encrypt your files or will lock your computer making it inaccessible either partially or wholly. Then a screen will be displayed asking for money i.e., ransom

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Designed to gain root access or we can say administrative privileges in the user system. Once gained the root access, the exploiter can do anything from stealing private files to private data.

A

Rootkits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

They work similar to Spyware. Infection mechanism is same but they don’t spy and steal information rather they wait for the command from hackers.

A

Zombies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Old Generation Attacks

A
  1. Theft of intellectual property
  2. Identity theft
  3. Theft of equipment and information
  4. Sabotage
  5. Information Extortion
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

means violation of intellectual property rights like copyrights, patents

A

Theft of intellectual property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

```

means to act someone else to obtain person9s personal information or to access vital
information they have like accessing the computer or social media account of a person by login into the account by using their login credentials.

A

Identity theft

24
increasing these days due to the mobile nature o fdevices and increasing information capacity
Theft of equipment and information
25
means destroying company9s website to cause loss of confidence on part of its customer
Sabotage
26
means theft of company9s property or information to receive payment in exchange
Information extortion
27
New Generation Attacks
1. Technology with weak security 1. Social media attacks 1. Mobile Malware 1. Outdated Security Software 1. Corporate data on personal devices 1. Social Engineering
28
With the advancement in technology, with every passing day a new gadget is being released in the market. But very few are fully secured and follows Information security principles
Technology with weak security
29
cyber-criminal identify and infect a cluster of websites that persons of a particular organisation visit, to steal information
Social media attacks
29
With new threats emerging every day, updating in security software is a pre requisite to have a fully secured environment.
Outdated Security Software
30
* There is a saying when there is a connectivity to Internet there will be danger to Security. * Same goes to Mobile phones where gaming applications are designed to lure customer to download the game and unintentionally, they will install malware or virus in the device.
Mobile Malware
31
These days every organization follows a rule BYOD. BYOD means Bring your own device like Laptops, Tablets to the workplace.
Corporate data on personal devices
32
* **manipulating people so that they give up their confidential** information like bank account details, password etc. * These criminals can trick you into giving your private and confidential information or they will gain your trust to get access to your computer to install a malicious software- that will give them control of your computer
Social Engineering
33
Social Engineering (Methods of Infiltration)
1. pretexting 2. tailgating 3. something for something (quid pro quo) 4. baiting 5. vishing 6. phishing 7. dumpster diving
34
an **attacker calls an individual and lies to them** in an attempt to gain access to privileged data.
Pretexting
35
an attacker quickly follows an authorized person into a secure location.
Tailgating
36
an attacker requests personal information from a party in exchange for something
Something for something (Quid pro quo)
37
The cyber criminal usually promises the victim a reward in return for sensitive information or knowledge of its whereabouts.
Baiting
38
is a cyberattack where the attacker gets their hands on sensitive documents or data you carelessly threw into the trash bin.
Dumpster diving
38
sent thru voicemails to convince victims they must act quickly to protect themselves from arrest or another risk.
Vishing
39
Wi-Fi Password Cracking (Methods of Infiltration)
1. Social engineering 2. Brute-force attacks 3. Network sniffing
40
The attacker **manipulates a person who knows the password into providing it.**
Social Engineering
41
The password maybe discovered by listening and capturing packets sent on the network.
Network Sniffing
42
The attack tries several possible passwords in an attempt to guess the password.
Brute-force attacks
43
Is a disruption of network services, this attack is a **malicious attempt by a single person** or a group of people to cause the victim, site or node to deny service to its customers.
Denial-of-Service (DoS)
43
when a malicious party sends a **fraudulent email disguised as being from a legitimate, trusted source.**
Phishing
44
a network, host, or application is sent an **enormous quantity of data at a rate which it cannot handle.**
Overwhelming quantity of traffic
45
when multiple hosts attack simultaneously
(Distributed Denial of Service) -
46
maliciously formatted packet is sent to a host or application and the receiver is unable to handle it.
Malicious formatted packets
47
types of DOS attacks
1. Penetration 1. Eavesdropping 1. Man-In-The-Middle 1. Flooding
48
* attacker gains access to same network * listens to traffic going in and out
eavesdropping
48
* **attacker gets inside your machine** * **take over machine and do whatever he wants** * achieves entry via software, stolen password
penetration
49
49
* attacker listens in input/output * can substitute messages in both directions
man-in-the-middle
49
50
* attacker sends overwhelming number of messages; great congestion
flooding
51
is a technique used by threat actors to **increase the prominence of their malicious websites**, making them look more authentic to consumers.
SEO Poisoning (SEO - Search Engine Optimization)
52
* Uses multiple techniques to compromise a target. * Uses a hybrid of worms, Trojan horses, spyware…
Blended Attack