Security Flashcards
What are the five categories of security violations?
Breach of confidentiality Unauthorised reading of data Breach of integrity Unauthorised modification of data Breach of availability Unauthorised destruction of data Theft of service Unauthorised use of resources Denial Of Service (DoS not MS-DOS!) Prevention of legitimate use Overload the targeted computer preventing it from doing any useful workMasquerading breach authentication By pretending to be an authorised user to escalate privileges
What are the different types of malware?
Viruses, Trojans, Rootkits, Worms, Spyware, Crimeware and adware
What are the types of viruses
Types of virus
Non-resident viruses
Disappear from a memory after system infected
Resident viruses
Remain in a memory after system infected
Temporary resident
Boot sector viruses
Remain in theMaster Boot Record(MBR) on a hard disk!!
Permanent resident (or a citizen)
What is a worm?
a standalonemalwarethat replicates itself in order to spread to other computers
Unlike acomputer virus,
it does not need to attach itself to an existing program
Drops a malicious payload and a backdoor!
Can cause some harm to the network, even if only by consuming bandwidth
What is a trojan
Trojan
is a non-self-replicating type ofmalware
Drops a malicious payload and a backdoor!
allowing unauthorised access to the target’s computer
What is ransomware
Ransomware: A type of Trojan/Worm
Prevents or limits users from accessing their system, either by locking the system’s screen or by locking/encrypting the users’ files unless a ransom is paid
One of the fastest growing malware in 2016 (PandaLabs report 2017)
What is spyware?
Gather information on the system (without user’s permission)
And then, send such information to another person
Interferes with networking software
causes difficulty connecting to the Internet
Unlikevirusesandworms,
It does not usually self-replicate
What is adware?
Adware is a spyware especially designed for advertising purpose
What is crimeware?
isdesigned specifically to automatecybercrime
perpetrateidentity theft
in order to access a computer user’s online accounts
at financial services companies and online retailers
What is a rootkit?
Hide itself from normal methods of detection
Try to obtain root or Administrator access