Section 6.54 Backdoors and Logic Bombs Flashcards

Objectives 2.4 Given a Scenario, analyse indicators of malicious activity

1
Q

Backdoor

A

Originally placed in computer programs to bypass the normal security and authentication functions

Most often put into systems by designers and programmers

Remote Access Trojan (RAT) acts just like a backdoor in our modern networks
● Can be placed by a threat actor on your computer to help them maintain persistent access to that system

Not good security practice but was created to so developers could get back in to their system without going through firewalls etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Easter egg

A

A hidden feature or novelty within a program that is typically inserted by the software developers as an inside joke

Code often has significant vulnerabilities

Eater egg code is vulnerable in comparison to the rest of of the code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Logic Bombs

A

Malicious code that’s inserted into a program, and the malicious code will only execute when certain conditions have been met

Jurassic Park: When Dennis the programmer placed a logic bomb of turning off the electrical grid for a short perod of time to grab the dinasour eggs to sell.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly