Security+ 1 Flashcards

1
Q

Propagation Mechanism : the way a malware object spreads …

Payload : malicious action the malware performs …

any type of malware can contain anytype of payload

virus : spread by user interaction

worms can be mitigated by updating OS and app patches (ex : Stuxnet)

trojans : application control provides useful mitigation

A

Virus etc …

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

RAT (Remote Access Trojans) : provide backdoors to hacked systems …

adware can : change default search engine, display pop-up ads, replace legitimate ads with other ads …

spyware can : log keystrokes, monitor web browsing, search HDD’s and cloud storage …

preventing malware techniques : anti-malware software, security patches, user education …

backdoor mechanisms : hardcoded accounts, default passwords, unknown access channels …

A

RAT etc …

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

backdoors, botnet agents, adware/spyware, and can be used for good purposes like antitheft mechanisms … user mode : run with normal user privileges and easy to write and difficult to detect … Kernel mode : run with system privileges and are difficult to write and easy to detect …

A

Rootkit Payloads :

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Signature Detection : identifying viruses by detecting known code patterns from a database … Polymorphic Virus change their own code to avoid signature detection and use encryption with a different key on each infected system …

A

Signature Detection Etc …

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

designed to be very difficult to reverse engineer and analyze. It is overly large, because it contains a large amount of misleading logic in order to foil attempts to figure out its mission … can write virus in assembly language, blocks use of system debuggers, and prevents sandboxing …

A

Armored Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

command and control network relay orders, communication must be indirect and redundant by — IRC, twitter, peer to peer within the botnet attackers dont communicate with infected systems directly as risk to being cut off by security analysts … Steps : Infect Systems, covert those systems to bots, and those bots infect others, they then reach out to command and control network the attacker owns and receive instructions, then execute those instructions by usually delivering spam or DoS across the internet …

A

Botnet Command and Control Through :

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

well funded and highly skilled, typically govt. sponsored, have access to zero days and other weapons, work methodically to gain access to a target … to defend against an APT attack try : build a strong security foundation, implement strong encryption, use rigorous monitoring …

Hacktivist : seek to use hacking tools to advance political and social agendas …

Nation-states sponsor highly sophisticated APT groups …

A

APTs (Advanced Persistent Threats) etc …

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

privilege escalation attacks can take normal user privileges and transform them into super user accounts … perform background checks, use separation of duties principle (using multiple users to carry out sensitive operations) to thwart these types of attacks

A

Insider Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Threat Intelligence : set of activities that an organization undertakes to educate itself about changes in cybersecurity threat landscape, and adapt security controls based upon that info.

Open Source Intelligence : gathering info from freely available public sources, ex : security websites. news media, social media, govt. sponsored security analysis centers, security researchers …

A

Threat/Open Source Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

search the web for valid email addresses at targets domain then use those email addresses to send out spearfishing attacks …

A

Email Harvesting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly