Lecture 2 Flashcards

1
Q

What are the 2 types of threats?

A
  1. Malicious software known as “Malware”
  2. Intruder is known as “Attacker”
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is ​Adware?

A

Displays popups of advertising downloads when the user is online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an Attack kit?

A

A set of tools that generates new malware automatically using a **variety of propagation **

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Auto-rooter?

A

Used to break into new machines remotely – to the highest root to gain full access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Backdoor?

A

Bypass a normal security check via a compromised system such as using a password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are Downloaders?

A

Code that installs other items on the machine that is under attack. It is normally included in the malware code which is placed in a compromised system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Drive-by Download?

A

Uses a code to compromise a website to exploit a browser vulnerability to attack a client system the website is viewed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Flooders?

A

Generating a volume of data to attack a networked computer system by applying DOS attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Keyloggers?

A

captures keystrokes in a compromised system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Logic bomb?

A

A program that is timed to cause harm at a certain point of time. It stays inactive until the time comes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Marco Virus?

A
  1. Uses a set of macro commands used by other programs to perform a sequence of actions automatically.
  2. Typically embedded in a document and triggered when it is viewed or run or replicate itself into other documents
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Mobile code?

A

A code transferred between systems/across a network in an email, document, file or a website which is executed via a network or a storage device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Rootkit?

A

A set of hacker tools used after the attacker had broken into a computer and gained root-access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Spyware?

A
  • Monitors the user’s activity of your computer
  • Aims to gather information about a person or company
  • Sent it to another computer.
  • Scans the computer for files containing sensitive information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a Trojan horse?

A
  • Harmless by accessing a user’s computer but secretly infects the computer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Classification of Malware

A

Independent, self-contained = Worms, Trojans and bots

Malware DOES NOT replicate = Trojans and Spam emails

Replicates viruses and worms

17
Q

Propagation mechanisms

A
  1. Infection of existing content by **viruses **
  2. Exploit of software vulnerabilities by malware replication from worms or drive-by-downloads
  3. Social Enginnering to encourage users to bypass security to Install Trojans to respond to phishing attack
18
Q

What is a Virus?

A
  • Malicious software that replicates itself
  • Easily spread through other environments
  • When it is attached to an executable program, the virus can secretly execute when the program is run

Finding weakness in OS and Hardware

19
Q

Worm

A
  1. Self-replicates itself via networks rapidly to find sensitive data and converting them into ‘bots
  2. Exploits client/server programs
  3. Spread through storage devices (USB, HDDs)
20
Q

What are the 3 Intruder classes?

A
  1. Masquerader: OUTSIDER An ‘unauthorised’ user that pretends to be an identity/legit user to perform such act
  2. Misfeasor: INSIDER Legit user that misuse the privileges
  3. Clandestine user: EITHER OUTSIDER or INSIDER

Surpasses control to evade auditing and access controls to surpass audit collection

21
Q

Give Examples of intrusion

A
  • Compromise the root remotely
  • Damages Web server
  • Guess/crack passwords
  • Copy database containing credit card details
  • Viewing sensitive data without authorisation
  • Use unsecured modem to access internal network
  • **Use unattended workstation **
22
Q

What is a hacker?

A
  • Motivated to gain access
  • Hacking community has been very ‘Strong’ and ‘popular
  • Status is determined by level of competence
  • Intruders consume resources and slow performance for legit users
  • Uses Virtual Private Network (VPN)
23
Q

What are the attacker motivations?

A
  1. Hobbyists: Crackers and experts whose main motivation is the intellectual challenge of breaking into a system
  2. Financial gain
  3. Political: Nation state
  4. Military/Strategy: nation state actors
  5. Psychological: Causing doubt in population
24
Q

Examples of Attacks

A

DOS
Distributed denial of service
Cross side scripting attacks
Buffer over flow attacks

25
Q

What is a Denial of Service?

A
  • Interruption that floods the traffic of the network that prevent legit users from accessing information and services
  • Blocks users from the websites they visit regularly: email, online accounts, online banking and other websites
26
Q

What are the types of resources in by DOS attacks?

A
  1. Network bandwidth: The speed + capacity of a network connection that is consumed
  2. System resource: Aims to crash or overload the handling software
  3. Application resources: Involves a number of valid requests each consumes significant resources and limit the ability of the server to respond to requests for users
27
Q

Source Address Spoofing

A
  • Uses forged source addresses
  • Makes attacking systems harder to identify
  • Generates large volumes of packets that have the target system as the destination address
  • Congests the router to lower capacity of the link ->
  • Network engineers need to query the flow of information
28
Q

What is SYN Spooling?

A
  • Common DOS attack
  • Attacks the ability of the server to damage the future connection requests
  • Legit users denied access to the server
29
Q

What is Flooding Attack?

A

**Overloads **the capacity of the server of:

  • ICMP flood
  • UDP (PORT number on target system)
  • TCP SYN
30
Q

What are the broad categories of pay loads?

A
  1. Corruption of the system or data
  2. Theft of service to make the system a zombie agent of attack
  3. **Theft of information **from the system
  4. **Hiding **the presence of the system