Section 3 Flashcards
There are two ways for malware to infect. What are they called?
Threat Vector
Attack Vector
What is a threat vector?
Method used by an attacker to access a victim’s machine
What is an attack vector?
Method used by an attacker to gain access to a victim’s machine in order
to infect it with malware
Malware infections usually start where?
within software, messaging, and media
What is a watering hole?
Malware is placed on a website that you know your potential victims will
access
What is a botnet?
A collection of compromised computers under the control of a master node
What is active interception?
Occurs when a computer is placed between the sender and receiver and
is able to capture or modify the traffic between them
What is privilege escalation?
Occurs when you are able to exploit a design flaw or bug in a system to
gain access to resources that a normal user isn’t able to access
____ are used to bypass normal security and authentication functions
Backdoors
Backdoors are highly discouraged in the modern technology world however a kind of backdoor still in use is…?
Remote Access Trojan (RAT) is placed by an attacker to maintain persistent
access
What is a logic bomb?
a type of malicious code embedded in software that remains dormant until specific conditions are met.
What is an Easter Egg?
Non-malicious code that when invoked, displays an insider joke, hidden
message, or secret feature
True or False: Logic bombs and Easter eggs should not be used according to secure coding standards
True
What are some symptoms of infection?
- Hard drives, files, or applications are not accessible anymore
▪ Strange noises occur
▪ Unusual error messages - Display looks strange
▪ Jumbled printouts
▪ Double file extensions are being displayed, such as textfile.txt.exe
▪ New files and folders have been created or files and folders are
missing/corrupted
▪ System Restore will not function
What are the ways that you can remove malware?
- Identify symptoms of a malware infection
o Quarantine the infected systems
o Disable System Restore (if using a Windows machine)
o Remediate the infected system
o Schedule automatic updates and scans
o Enable System Restore and create a new restore point
o Provide end user security awareness training
o If a boot sector virus is suspected, reboot the computer from an external device
and scan it