InfoSec Threats Flashcards
Examples of a Natural threat.
- Natural Disasters
- Power Failures
What is a threat?
The potential occurence of an undesirable event that couyld cause damage or disruption to an organization.
Examples of Unintentional Threats.
- Unskilled Admins
- Negligent workers
- Accidents
- Lazy/Untrained employees
Examples of Intentional Internal Threats.
- Disgruntled Employees
- Fired Employees
- Service Providers
- Contractors
Examples of Intentional ExternalThreats.
- Hackers
- Criminals
- Terrorists
- Foreign agencies
- Other corporations
Describe the following Threat Actors/Agents
a) Black Hats
b) White Hats
c) Gray Hats
d) Suicide Hackers
e) Script Kiddies
a) Offensive hackers that intentionally cause malicious or destructive events.
b) Individuals who use hacking skills for protective purposes.
c) Individuals who work both offensively and defensively.
d) Individuals who want to cause destruction and aren’t worried about the consequences.
e) Unskilled hackers who use pre-built tools and scripts without real knowledge of what they are using.
Describe Malware.
Malware is malicious software that damages and disables computer systems and also gives partial or full control of system to the malware creator.
Describe these Common Technqiues to distribute malware:
a) Black hat SEO
b) Social Engineered Click-Jacking
c) Spear-Phishing Sites
d) Malvertising
e) Compromised Legitimate Websites
f) Drive-by Downloads
g) Spam Emails
a) Ranking malware sites highly in search results.
b) Tricking users to click on ‘innocent-looking’ web pages.
c) Mimic legitimite institutions to steal login credentials.
d) Embed malware into ad-netoworks.
e) Embed malware into legitimate websites
f) Exploits flaws in browers to install malware when visiting a page.
g) Coaxing recipients to click on emails that have embedded malware within links/attachments.
Describe these components of Malware:
a) Crypter
b) Downloader
c) Dropper
d) Exploit
e) Injector
f) Obfuscator
g) Packer
h) Payload
i) Malicious Code
a) Encrypts malware to make reverse-engineering/analysis difficult.
b) Trojan that downloads other malware.
c) Trojan that covertly installs malware.
d) Is the code that breaches system vulnerabilities
e) A program that injects code into other processes.
f) A program that conceals its code, making it harder to detect.
g) A program that compresses malware files into a single executables to evade detection.
h) The software that allows control of a computer system after the exploit.
i) A command that defines the malware’s function.
What is a Trojan?
It is a program that contains malicious code which is hidden inside another apparently harmless program.
What is a Virus?
Is a self-replicating program that attaches itself to other files, boot sector or program.
What is Ransomware?
A type of malware that restrict use and access of data. Demands an online payment to unlock restriction to data.
What is a Worm?
A malicious program that replicates, spreads and executes without being attached to another file/document.
What are Rootkits?
Hard to detect malware that replace OS system calls and utilities to avoid detection.
What is Adware?
Programs that generate unsolicited ads and pop-ups.