Module 6: Handling Malicious Code Incidents Flashcards
What is a virus
Small malicious codes that are attached to files in computers and replicate themselves to spread and infect other files without the user’s knowledge or permission
How do viruses spread
Through email attachments, instant messages, download from the Internet, etc.
Viruses are generally characterized as
- File infectors (attached to programs or files)
- System or boot-record infectors (infect executable code)
- Macro viruses (Infect Word application)
What is a worm
A self-replicating computer program
How does a worm spread
Worms spread automatically by infecting one system after the other in a network, and even spreading further to other networks
TRUE or FALSE: A worm relies for a user’s action for execution
FALSE
What is a Trojan
Malicious programs masked as a genuine harmless program
How does a Trojan work
Install backdoors on user’s system and allows unauthorized access to the attacker
What is spyware
Software that gathers user information without user’s knowledge
How does one generally start the preparation for preventing malware
Installing anti-virus software and backing up important data
What are the 10 steps to handling malware incidents
- Establish malicious code security policy
- Install antivirus software
- Check all downloaded files and email attachments for infection
- Check all the removable media such as USB, diskettes, etc.
- Users must be aware of malicious code issues
- Study the antivirus vendor bulletins
- Install host based IDS’s on critical hosts
- Collect malware incident analysis resources
- Acquire malware incident mitigation software
- Establish the procedures for reporting of malicious code incident
TRUE or FALSE: A point of contact for reporting malicious code is needed
TRUE
How can spyware be prevented
Disabling a user’s web browser such that it prevents the installation of plug-ins
What is one way to help make sure users handle email attachments properly
Educate the users
.exe, .txt, .vbs, .htm are all examples of files that need to be what
Blocked due to malicious file extensions. Especially on the email server and client