Malicious Software Flashcards

1
Q

Malware

A
  • is a nosy software that is designed to damage and destroy computers and computers systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Widely used toolkits include:

A
  • Zeus
    -Blackhole
  • Sakura
    -Phoenix
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Examples of organized Attack sources

A
  • politically motivated attackers
  • Criminals
  • Organized crime
  • Organizations that sell their services to companies and nations
  • National government agencies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Worm

A

Without user action, the Worm program that propagates copies of itself to other computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Logic bomb

A

triggers action when condition occurs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Trojan horse

A

program that contains unexpected additional functionality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Backdoor

A
  • modification that allows unauthorized access to functionality
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Clickjacking

A

Vulnerability used by an attacker to collect an infected user’s clicks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Virus lifecycle
propagation , what order and functions

A
  • second step
  • The virus places a copy of itself into other programs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Virus lifecycle
Dormant , what order and functions

A
  • First step
  • the virus is idle and waiting
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Virus lifecycle
Execution , what order and functions

A
  • forth and last step
  • Virus function is performed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Virus lifecycle
Trigger , what order and functions

A
  • Third step
  • Virus is activated to perform function for which it was intended.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Virus classification
by Target

A
  • boot sector virus
  • macro virus
  • file infector
  • multipartite virus
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Virus classification
by concealment / hiding

A
  • Encrypted virus
  • stealth virus
  • polymorphic virus
  • metamorphic virus
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

transport vehicles

A
  • Can rapidly compromise a large number of system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Spam (uninvited)

A
  • Unsolicited bulk email
  • signification carrier of malware
  • Used for phishing attacks
15
Q

Botnet

A

A collection of bots capable of acting in a coordinated manner

16
Q

Zombies can be used to make:

A
  • Dos
  • Spamming
  • sniffing traffic
  • keylogging
  • spreading new malware
17
Q

Keylogger

A

To allow monitor sensitive information

18
Q

Spyware

A

Compromised machine to allow monitor a wide range of activity on the system

19
Q

Rootkit classification:

A
  • persistent , memory base , user mode , kernel mode , virtual machine base , external mode