Section 2.4 Flashcards
What is malware and what are some types of Malware?
Malware is a malicious software that is attempting to temper with the system.
Examples of malware:
- Gathering Keystrokes
- Show Fake Ads
- Viruses
- Worms
- Ransomware
- Trojan Horse
What is Ransomware?
Ransomware is an attack that encrypts all of your data in your system, leaving the Operating System still available to display a message, and the attacker will request money, in exchange for the decryption key to the data.
How to protect against Ransomware?
- Always have a backup, ideally offline.
- Keep the OS and applications up to date to make sure the vulnerabilities are patched
- Use Anti Virus software
What is a Virus?
A virus is malware that can reproduce itself. It is usually initiated by running an application or clicking on a link. Anti-Virus is one of the best ways to fight against it.
What is a Fileless Virus?
A fileless virus is a virus that does not store itself in the file system but instead it operates in memory. This makes these type of viruses harder to catch from anti virus software.
These kind of viruses usually add a auto start in the registry in order for it to always start up when the system boots up.
What is a Worm?
A worm is also a type of malware, but unlike a virus, it can spread on its own without needing to attach to a program or file. Worms replicate themselves and spread across networks by exploiting security vulnerabilities. Because they don’t require user action to spread, worms can infect large numbers of computers very quickly
What is Spyware?
Spyware is malware that is watching everything that is happening in the system with a goal to perform identity theft or affiliate fraud, etc.
What is Keylogger?
An application that captures every keystroke performed on a keyboard and then sends the data back to the attacker.
- This could be your URL, Passwords, Email messages, and more
What is Bloatware?
Bloatware are applications installed in a system that you didn’t expect. Usually, manufacturers install these applications to make money off the vendor.
The problem with Bloatware is that it may be hard to update them since you dont know they exist and this can lead to unpatched vulnerabilities in the system.
What is a logic bomb?
A logic bomb wait for a specific event to occur and then the “bomb” goes off.
For example, the logic bomb waits for a date and time, and may reboot the system and erase data.
What is a Rootkits?
A rootkit is a type of malicious software designed to gain unauthorized access to a computer or network and maintain persistent, hidden control over the system. Rootkits typically operate at a very low level within the operating system, making them difficult to detect and remove. They often modify core system files or the kernel, allowing the attacker to hide their presence and activities, such as keylogging, data theft, or launching further attacks.
What are some brute force physical attacks?
Breaking through physical obstructions such as doors and windows.
Picking on locks
etc
What is RFID Cloning?
RFID cloning refers to the duplication of an access badge or key fob that contains an RFID. By performing the RFID cloning on an access badge, an attacker can now enter the area that the access badge is required.
MFA is important here because an attacker could get access to your card, but they will not have access to a code that only you know.
What are Environmental Attacks?
These are attacks to anything that is supporting the technology.
For example, cutting the power off the shut down the servers,
or tampering with the HVAC system in order for the data centers to overheat and shut down the servers.
What are some purposes of Denial of Service (DoS)?
Since denial of service will force a service to fail, the purpose of such action can be because of the following:
- Competitive advantage by taking out the competition,
- Create a smokescreen for another planned exploit