Section 2.4 Flashcards

1
Q

What is malware and what are some types of Malware?

A

Malware is a malicious software that is attempting to temper with the system.

Examples of malware:
- Gathering Keystrokes
- Show Fake Ads
- Viruses
- Worms
- Ransomware
- Trojan Horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Ransomware?

A

Ransomware is an attack that encrypts all of your data in your system, leaving the Operating System still available to display a message, and the attacker will request money, in exchange for the decryption key to the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How to protect against Ransomware?

A
  1. Always have a backup, ideally offline.
  2. Keep the OS and applications up to date to make sure the vulnerabilities are patched
  3. Use Anti Virus software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Virus?

A

A virus is malware that can reproduce itself. It is usually initiated by running an application or clicking on a link. Anti-Virus is one of the best ways to fight against it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Fileless Virus?

A

A fileless virus is a virus that does not store itself in the file system but instead it operates in memory. This makes these type of viruses harder to catch from anti virus software.

These kind of viruses usually add a auto start in the registry in order for it to always start up when the system boots up.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Worm?

A

A worm is also a type of malware, but unlike a virus, it can spread on its own without needing to attach to a program or file. Worms replicate themselves and spread across networks by exploiting security vulnerabilities. Because they don’t require user action to spread, worms can infect large numbers of computers very quickly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Spyware?

A

Spyware is malware that is watching everything that is happening in the system with a goal to perform identity theft or affiliate fraud, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Keylogger?

A

An application that captures every keystroke performed on a keyboard and then sends the data back to the attacker.

  • This could be your URL, Passwords, Email messages, and more
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Bloatware?

A

Bloatware are applications installed in a system that you didn’t expect. Usually, manufacturers install these applications to make money off the vendor.
The problem with Bloatware is that it may be hard to update them since you dont know they exist and this can lead to unpatched vulnerabilities in the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a logic bomb?

A

A logic bomb wait for a specific event to occur and then the “bomb” goes off.

For example, the logic bomb waits for a date and time, and may reboot the system and erase data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Rootkits?

A

A rootkit is a type of malicious software designed to gain unauthorized access to a computer or network and maintain persistent, hidden control over the system. Rootkits typically operate at a very low level within the operating system, making them difficult to detect and remove. They often modify core system files or the kernel, allowing the attacker to hide their presence and activities, such as keylogging, data theft, or launching further attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are some brute force physical attacks?

A

Breaking through physical obstructions such as doors and windows.
Picking on locks
etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is RFID Cloning?

A

RFID cloning refers to the duplication of an access badge or key fob that contains an RFID. By performing the RFID cloning on an access badge, an attacker can now enter the area that the access badge is required.

MFA is important here because an attacker could get access to your card, but they will not have access to a code that only you know.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are Environmental Attacks?

A

These are attacks to anything that is supporting the technology.
For example, cutting the power off the shut down the servers,
or tampering with the HVAC system in order for the data centers to overheat and shut down the servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are some purposes of Denial of Service (DoS)?

A

Since denial of service will force a service to fail, the purpose of such action can be because of the following:
- Competitive advantage by taking out the competition,
- Create a smokescreen for another planned exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Wireless Deauthentication Attack?

A

Wireless Deauthentication attack is a DoS (denial of service) attack that blocks users from connecting wirelessly to the network.

16
Q

What is Radio Frequency (RF) jamming?

A

This is a DoS attack with a goal of decreasing the signal to noise ratio at the receiving device. This way the receiving device can’t hear any good signal, which leads to jamming its RF.

17
Q

What is On Path Attack? (man in the middle attack)

A

On Path attack allows the attacker to sit between two devices and watch the traffic go back and forth between those systems.
This attack is also known as the Man in The Middle Attack.

18
Q

What is ARP poisoning?

A

ARP poisoning is an On Path Attack on the local IP Subnet.

19
Q

What is ARP?

A

ARP (Address Resolution Protocol) is a network protocol used to map IP addresses to MAC addresses, allowing devices within the same local network to communicate with each other.

20
Q

What is On Path Browser Attack? (or man-in-the-browser)

A

An on-path browser attack is when a hacker secretly gets into your web browser and starts controlling what you see and do online.

20
Q

What is a Replay Attack?

A

A replay attack is a type of network attack in which the attacker intercepts the data transmitted between two parties and then later retransmits the data to trick the receiver to perform an unauthorized action.

20
Q

What is Session Hijacking?

A

The attacker gets access to the victims session ID and now they use that session ID to pose like the victims computer to get access to the web server.

21
Q

What is a Hash Collision?

A

A hash collision is the same hash value for two different plaintexts.

21
Q

What is SSL Stripping?

A

SSL stripping combines on path attack and downgrade attack by sitting in the middle of a conversation between two parties (on path attack) and sending a message to one of the parties, for example telling the victim that there’s no need to send HTTPS instead they can send HTTP (Downgrade attack). By stripping the S away, the attacker takes away the encryption.

21
Q

What is a Spraying Attack?

A

A spraying attack is an attack for which the attacker guesses the passwords of user accounts. This specific attack uses the commonly known list of passwords. The attacker will only try up to 3 passwords per account and then move on to the next account. The attacker does not want to lock out the account, they just want to find the accounts that are using the commonly known passwords.

21
Q

What is IOC (Indicators of Compromise)?

A

Indicator of Compromise of IOC is an event that indicates an intrusion.

22
Q

What are some common IOC?

A

Some common Indicators of Compromise are:
- Unusual amount of network activity
- Change to file hash values
- Irregular International traffic
- Changes to DNS data
- Uncommon login patterns
- Spikes of read requests to certain files