MODULE 5 Flashcards

1
Q

Malware:

A

A program that intends to compromise confidentiality, integrity, or availability system assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Backdoor (Trapdoor):

A

Secret entry point that bypasses security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Mobile code:

A

Programs that move between heterogeneous devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Auto-rooter kit:

A

Malware that generates virus codes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Crimeware:

A

Kits for building malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Rootkit:

A

Set of hidden programs that acquire administrative access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Zombie (Bot):

A

Software on internet attached computers that launch attacks on others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

APT stands for _____

A

Advanced Persistent Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

APT:

A

Sophisticated attacks over an extended period on selected targets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Classification of malware:

A
  • Needs host
  • Independent
  • Doesn’t replicate
  • Replicates
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Attack sources:

A
  • Politically motivated
  • Criminals
  • Organized crime
  • International consultancy organizations
  • National government agencies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

APT techniques:

A
  • Social engineering
  • Spear-phishing
  • Drive-by-downloads
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

APT’s intent:

A
  • Infect the target
  • Extend access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Phases of a typical virus:

A
  • Dormant (Idle)
  • Propagation (Copying)
  • Triggering (Activating)
  • Execution (Performing functions)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Mobile phone worms:

A

Worms that communicate via Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Threat mitigation options:

A
  • Detection
  • Identification
  • Removal
13
Q

Virus components:

A
  • Infection mechanism
  • Trigger
  • Payload
14
Q

Drive-by-download:

A

Exploiting browser vulnerabilities when a user visits a compromised website

14
Q

Water-hole attack:

A

Studying victim behavior to know what websites they use and then scanning said websites for vulnerabilities to compromise it

14
Q

Malvertising:

A

Paying for ads with malware in them on websites that the victim visits

15
Q

Clickjacking (UI redress attack):

A

Leading the user to believe that they’re typing their password to their bank account when instead, they’re typing it into an invisible frame

15
Q

Payload types:

A
  • Causing system corruption
  • Attack agent bots
  • Information theft
  • Rootkits and backdoors
16
Q

Klez payload:

A

Stops anti-virus programs

17
Q

Chernobyl payload:

A

Infects files when they’re opened

18
Q

Ransomware payload:

A

Encrypts user data to demand payment in order to recover the data

19
Q

Real-world damage payload:

A

Damages physical equipment

20
Q

DDoS stands for _____

A

Distributed Denial of Service

21
Q

Bot uses:

A
  • DDoS
  • Spam
  • Advertisement
  • Manipulating polls
  • Spreading malware
  • Sniffing
22
Q

Phishing identity theft:

A

Social engineering by masquerading as a trusted source

23
Q

Spear phishing:

A

Acting as a trusted source for a specific target

24
Q

Main elements of prevention:

A
  • Policy
  • Awareness
  • Vulnerability mitigation
  • Threat mitigation
25
Q

Requirements for effective malware countermeasures:

A
  • Generality
  • Timeliness
  • Resiliency
  • Minimal DoS costs
  • Transparency
  • Global/local coverage
26
Q

Antivirus software generations:

A
  1. Simple scanners
  2. Heuristic scanners
  3. Activity traps
  4. Full-featured protection
27
Q

Host-based behavior-blocking software:

A

Software that integrates with the host to monitor program behavior for malicious actions