Section 4 Flashcards
What is known as an umbrella term?
Malware
What part of malware is illegal?
Using the Malware
Is making malware illegal?
no
Is having malware illegal?
no
Is using malware illegal?
Yes
Who would be free to create malware but if you put it on someone else’s system it becomes illegal?
White Hat Hacker
You can create malware and use it on your own system. True or False
True
6.549 variants of what?
malware
One of the largest malware researchers in the world?
Symantec
Different kinds of malware:
1.
2.
3.
- viruses
- trojans
- worms
A virus is a type of malware. True or False
True
Do viruses need human interaction to spread?
Yes
Open email, click on link, download a file all need human interaction and allow what to spread?
Viruses
There are numerous possible outcomes with viruses. True or False
True
Floppy discs and hard drive all have what?
Boot Sector
Viruses are designed specifically for what? The virus activates itself as part of the system.
Boot Sectors
Elk Cloner is a what?
Boot Sector Virus
Decided to prank his friends where it would attach itself to a floppy disk and spread from there. The “50th” time you accessed the disk there would be a poem and it spread out of control. Because it was in the boot sector it became very difficult to get rid of.
Elk Cloner
Microsoft office suite has its own macro functions, and you can create viruses specifically designed to spread using the macro functions.
Macro Viruses
Different viruses have different goals (annoying, destroy data, steal data, etc.) True or False
True
Hides within something?
Trojans
Program that records the buttons that are hit on a keyboard and either stores them for later retrieval or sends them to the bad guys.
keyloggers
Webcams, microphones. You accidentally get a trojan on your laptop they may have access to the camera and microphone. Big tech people recently were filmed and interviewed at his desk and his laptop and had post it notes on his camera to keep people from seeing everything.
File/ Peripheral Access
Infect people and make them be your what?
Proxy
When police get mad at you for doing something, they will actually get mad at the people who I infected. True or False
True
Payloads can be many different things and one example is a key logger. True or False
True
Digital pirate and want to download a cracked copy of a video game and someone had hidden a trojan in it. True or False
True
Do worms need human interaction?
No
What spreads VERY quickly and their lifetime is only hours?
Worms
In 1988 who accidentally launched a worm and took down a significant portion of the internet.
Morris worm
What resulted in the first CERT?
Morris Worm
CERT stands for what?
Computer Emergency Response Team
Who are teams that are specifically designed to fix problems or diagnose issues? If anyone has a major cyber event they will come out and try to figure out what went wrong and make sure it never happens again.
CERT
You just launch them and they go. They can only have a few hours because of how fast they spread.
Worms
A kind of virus/trojan and you get a piece of malware on your computer and it allows someone else to control your machine.
Botnet
A Bot Master will send out a bot virus and it gets infected on your computer and the more it infects the larger it grows. True or False
True
The larger botnet on record was how many computers?
A few million
The botnet virus sits quietly on your machine and contacts a server somewhere and it listens and waits. If the master wants to do something he can send or post a command on the server and all the bots do whatever the command is. True or False
True
One of the more common uses of botnet is what?
Distributed Denial of Service Attack
If I get upset at PayPal if I have a few thousand bots at my command to send amazon junk data or invalid requests or anything that occupies the PayPal servers so much that they don’t have the resources to deal with the traffic. The best scenario for the bad guy is that the server shuts down. The best case for the service is that their service runs even if just slow. True or False
True
Child pron installing of keeping them on your own computer you can keep them stored on the other peoples computer. To access them you would get on the botnet to look at them. This is using what?
Hidden Files
Spam creators will use a botnet to send spam. True or False
True
Spam: If there are 10,000 computers at their command, they will keep sending them and no one can block them. True or False
True
Describes all the other stuff connected to the internet. Air conditioning, refrigerators, doorbells. All kins of things connected to the internet that is not computer or phones. Someone has created a botnet and doing an attack.
Internet of things
People who create internet of things are not thinking about what?
Security
Now there are more devices connected to the internet than their are on the earth.
True
Download a program accidentally, usually through a trojan or a bad link. It encrypts your hard drive and displays an image that they are the police and they demand payment through bitcoin or another harder to trace payment. You can format and reinstall your hard drive or lose everything encrypted. You can pay the money and they may or may not fix your computer.
Ransomeware
70% of businesses pay, 20% over 40k. True or False
True
Ransomeware has become a money maker for these people. It is one of the reasons why a backup is important.
True
You should have on site and off site back ups. True or False
True
A lot of these overlap. It might be a trojan that delivers ransomware. One infected email, one bad link on a website that may have a piece of malware that falls into multiple categories. True or False
True