MODULE 5 Flashcards
Malware:
A program that intends to compromise confidentiality, integrity, or availability system assets
Backdoor (Trapdoor):
Secret entry point that bypasses security
Mobile code:
Programs that move between heterogeneous devices
Auto-rooter kit:
Malware that generates virus codes
Crimeware:
Kits for building malware
Rootkit:
Set of hidden programs that acquire administrative access
Zombie (Bot):
Software on internet attached computers that launch attacks on others
APT stands for _____
Advanced Persistent Threats
APT:
Sophisticated attacks over an extended period on selected targets
Classification of malware:
- Needs host
- Independent
- Doesn’t replicate
- Replicates
Attack sources:
- Politically motivated
- Criminals
- Organized crime
- International consultancy organizations
- National government agencies
APT techniques:
- Social engineering
- Spear-phishing
- Drive-by-downloads
APT’s intent:
- Infect the target
- Extend access
Phases of a typical virus:
- Dormant (Idle)
- Propagation (Copying)
- Triggering (Activating)
- Execution (Performing functions)
Mobile phone worms:
Worms that communicate via Bluetooth