Malicious Software Flashcards

1
Q

Who is spam costly to?

A

Both the network infrastructure and the user who must filter emails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Who sends spam?

A

Sometimes legitimate sources, but most is sent by botnets on comprised user systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name different types of spam

A

Advertising, scams, carrying malware, phishing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What makes spam hard to counter?

A

It exploits human behaviour, such as the user’s gullibility. It requires active user participation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the three types of Trojan?

A

Hector, Priam, Paris…
Trojans which perform the function of a program while performing separate malicious activity.
Trojans which perform the function of the program but modifying this function to perform or disguise other malicious activity.
Trojans which replace the original function entirely, to perform a malicious function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a bot?

A

A bot subverts the computational and network resources of an infected system, for the use of the attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a botnet?

A

A coordinated network of bots.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are bots used for?

A

Distributed Denial of Service Attacks, Spamming, Sniffing traffic, Key logging, Spreading malware etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What makes bots different from worms?

A

Bots are initially controlled from some central facility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is spear phishing?

A

When the target is specifically chosen and researched by the attacker, making their email more personalised to convince of authenticity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why might SMPT allow spam more easily?

A

It has no built in authenticity checks. Also, the recipient’s mail server only sees the IP address of the direct peer from which it received the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why would a spammer want to hide their IP?

A

To avoid DNS or ISP blacklists. They could also do this by using botnets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is greylisting?

A

The server rejects the first email from a sender which it does not recognise. If the sender resends their message, then it is probably legitimate and they get accepted. Botnets do not tend to retry sending emails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Is email security done by the protocol or the client?

A

The client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a javascript language attack? How can we prevent it?

A

Since javascript is executed in the browser, the attacker can use this to be able to execute some code on the user’s machine. This is also known as cross-site scripting.
We can prevent it by pre-processing input from the user before using it in HTML, using firewalls, using an auditing system etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly