Malicious and Mobile Code (Lesson 9) Flashcards

1
Q

Time(logic) bomb

A

a program that is set to execute it’s payload upon a certain condition being met.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Worm

A

Does not need to attach itself to another program to reproduce, attempts to gain access to other systems on a network and then copies itself to these new systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Viruses

A

a program that reproduces by attaching copies of itself to other programs, often carries a malicious “payload”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Trojan horses

A

A program that appears to do one thing (and may indeed do it) but that hides something else.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Program Infector Viruses

A

Contaminates files that contain computer code, especially .EXE and .COM files but also .SYS and .DLL.
About 85% of viruses (at one time) were program viruses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Boot Viruses

A
Computer operating systems typically set aside a portion of each disk for code to boot the computer. Under DOS, this section is called a boot sector on floppies or a master boot record (MBR) for hard disks. 
Boot Viruses (or System infectors) store themselves in this area and hence are invoked whenever the disk is used to boot the system.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Macro Viruses

A

Manifested in an auto-exec macro embedded in document files of applications with a macro capability
-e.g. word processors, spreadsheets
First one detected was the Concept virus that infected Microsoft Word document files.
-Detected in July 1995, by the fall it was the most frequently reported virus.
Since the Concept virus, numerous macro viruses have been created.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Detection of and Protection against Viruses

A
Usually you won’t know until something bad happens.
Don’t run programs you can’t trust.
-Shrinkwrap is not always a guarantee
Install a virus checking program
update it frequently
Backup, backup, backup
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Who does time/logic bombs most often?

A

Insiders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly