Security Plus - Chapter 3 Flashcards

1
Q

Malware

A

Software that is intentionally designed to cause harm to systems, devices, networks, or users. Gathers information, provides illicit access, and may take a broad range of actions that the legitimate owner of a system or network may not want to occur.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Ransomware

A

Malware that takes over a computer and then demands a ransom. Usually driven by phishing campaigns with unsuspecting victims installing the malware. Also installed from RDP sessions, vulnerable services, or front facing applications that are compromised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Ransomware IoCs

A
  • Command and control traffic and/or contact to known malicious IP addresses
  • Use of legitimate tools in abnormal ways to retain control of the compromised system
  • Lateral movement processes that seek to attack or gain information about other systems or devices inside the same trust boundaries
  • Encryption of files
  • Notices to end users of the encryption process with demands for ransom
  • Data exfiltration behaviors, including large file transfers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Trojan Horse

A

Malware that is typically disguised as legitimate software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Tools to Identify Trojan Horse Malware

A

Anti-malware
Endpoint Detection and Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Botnets

A

Groups of systems that malware is installed on that are under command & control of a centralized attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Worms

A

Malware that are automated and once inside a system can spread on its own without user interaction. They are usually embedded in vulnerable services, email attachments, work file shares, IoT devices, and phones. Can be controlled through network-level controls IPS devices, network segmentation, and firewalls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Spyware

A

Malware that is designed to obtain information about an individual, organization, or system. Combated using anti-malware and user awareness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Bloatware

A

Unwanted applications installed on new build computers by the manufacturers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Viruses

A

Malicious programs that self-copy and self-replicate once they are activated. Viruses require an infection mechanism like copying from a thumb drive or on a network share drive. Viruses use a trigger, sets the condition for the virus to execute, and a payload, what the virus does, delivers, and the action it performs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Keyloggers

A

Programs that capture keystrokes from a keyboard, mouse movements, or touchscreen inputs. They can capture data from the kernel, via APIs or scripts, or even directly from memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Logic Bombs

A

Functions or code placed inside other programs that will activate when set conditions are met.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Rootkits

A

Malware that is specifically designed to allow attackers access to a system through a backdoor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly