Quiz (Malware) Flashcards

1
Q

What is a proactive security?

A

Prevents incidents before they happen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a reactive security?

A

Allowing system defenders to identify and mitigate intrusions before they escalate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why the need for reactive security? (2 points)

A
  • sophisticated and well-financed threat groups have demonstrated the ability to penetrate networks
  • attacks take place over a period of many month
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is data provenance?

A

Describe the totality of system execution and facilitates causal analysis of system activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is backward tracing?

A

Reconstructing the chain of events that lead to an attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is forward tracing?

A

The ramifications of the attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is malware?

A

Refers to a program that is covertly inserted into another program with the intent to destroy data, run destructive or intrusive programs, or otherwise compromise the confidentiality, integrity or availability of the victim’s data, applications, or OS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is virus?

A

Malicious code that is spread through infected programs or files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is worm?

A

A self-replicating, self-contained program, directly uses a network service to spread itself (without user intervention). Typically exploits a vulnerability in a target to execute code that then exploits more systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is trojan horse?

A

A self-contained, nonreplicating program that, while appearing to be benign, actually has a hidden malicious purpose.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the format of infection for virus? (2 points)

A
  • Encrypt virus code to prevent “signature-based” detection
  • Polymorphism to change virus code to prevent signature
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A virus lays dormant in your system until you execute it or take some other required actions, while worms do not rely on you to trigger them. T/F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How is Zeus (trojan horse malware) being spread?

A

Drive-by downloads and phishing schemes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a trap door?

A

An undocumented entry point to a module. Inserted during code development to facilitate access or modification in the future.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Who can exploit trap doors?

A

Original developer or who discovers it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a logic bomb?

A

A program that performs an action that violates the security policy when some external event occurs

17
Q

What is a bot?

A

A computer that is infected with malware that accepts remote command from the attacker. A large collection of these systems is called a botnet.

18
Q

What is ransomware?

A

A malware designed to extort the user in exchange for access of something of value.

19
Q

What is crypto-ransomware?

A

Encrypts data file-by-file, but the attacker keeps a secret from the victim.

20
Q

What are some financial mechanisms for ransomware?

A
  • cryptocurrency
  • premium phone number
  • prepaid cards
21
Q

What are some problems with ransomware?

A
  • C&C server errors
  • key reuse
    -memory protection
  • DIY crypto
  • key generation
  • poor security hygiene
22
Q

How to handle ransomware?

A
  • decide that a program is or is not malware before it starts encrypting
  • monitor for data changes that indicate a problem in progress and alert
23
Q

What are some ways to distribute malware?

A
  • social engineering (Trojan horse)
  • vulnerable systems (buffer overflow, common password)
24
Q

What is drive-by-download?

A

when a browser is exploited to install malware without the victim’s knowledge

25
Q

What are some attacker’s goals?

A
  • personal information
  • mayhem
  • ransom
  • computing resources
26
Q

What are some static detection approaches?

A
  • examine files for similarity to known malware
  • keep hashes of all important files on disk to detect modifications to legitimate files
27
Q

What are some dynamic detection?

A
  • monitor what happen as program runs, like system call sequences, information flow, network accesses.