Security Threats Flashcards
1
Q
Malware
A
-Malicious software
- Gather information
- Keystrokes
- Participate in a group (controlled botnet)
- Extortion
- Viruses & worms
2
Q
Spyware
A
- Malware that spies on you
- Advertising , identify theft , affiliate fraud
- Can trick you into installing
- Peer-to-Peer , fake security software
- Browsing monitoring
- Capture surfing habits - Keyloggers
- Capture every keystroke & Report back
3
Q
Viruses
A
- Malware that can reproduce itself
- It needs you to execute a program
- Reproduces through file systems or the network
- Just running programs can spread a virus
- May or may not cause problems
- Some viruses are invisible , some are annoying
- Anti-virus is common
- Thousands of new ones everyday
4
Q
Worm
A
- Malware that self-replicate
- Doesn’t need you to do anything
- Uses the network as a transmission medium
-Can take over system very quickly
- Worms can also do good things
- Nachi tried to patch your computer to protect from blaster worm
- Firewalls & IDS / IPS can migrate many worms
- Doesn’t help once worm is inside
5
Q
Trojan Horse
A
- A digital wooden horse
- Software that pretends to be something else
- Circumvents your existing security
- Anti-virus may catch it when it rains
- Trojans are built to avoid & disable Anti-virus
- Once inside it has free reign
- may open gates to let in other programs
6
Q
Rootkits
A
- Originally a Unix technique
- The “root” in rootkit
- Can be invisible to the operating system
- Modifies core system files (part of the kernel)
- Also invisible to traditional anti-virus utilities
- Hide in the OS \Windows\System (800MB 2,000 Files)
- Name a similar to a legit system file (run32dl1.dll)
7
Q
Ransomware
A
- Data is held hostage
- Data provided after payment
- Malware encrypts your data files
- Pictures , documents , music , movies , etc
- OS remains available
- they want you running, but not working
- Must pay to receive encryption key
- Untraceable payment system
8
Q
Phishing
A
- Social engineering with a touch of spoofing
- Often delivered via spam , IM , etc
- Don’t be fooled
- Check URL
- Usually something not quite right
- Spelling , fonts , graphics
- Spear phishing
- Targeted & sophisticated phishing
9
Q
Spoofing
A
- Pretending to be a someone you aren’t
- A technological chameleon
- Modify your MAC address
- Change in hardware / driver configuration
- Use different IP Address
- Make a request ; The response goes to real IP Addy
- Fundamental with many DDoS attack types
- Always a challenge to protect against
10
Q
Social Engineering
A
- Major threat
- Electronically undetectable
-Suspicious telephone call
- Look out for unattended person
- Badges
- Processes
-Know how to handle a possible threat
11
Q
Shoulder Surfing
A
- You have access to important information
- Curiosity , industrial espionage , competitive advantage
- Very Easy
- Airports / Flights
- Hallway-facing monitors
- Coffee shops
- Surf from afar
- Binoculars / telescopes
- Webcam monitoring
12
Q
Zero-day Attacks
A
-Many applications have vulnerability
- Someone is working hard to find new vulnerabilities
- Good people share with developer
- Bad guys keep to themselves & exploit
- Zero-day
- Vulnerabilities that haven’t been discovered or published
13
Q
Distributed Denial of Service
DDoS
A
- Launch on army of computers to bring down a service
- Use all the bandwidth or resource - traffic spike
- Why bad guys have botnets
- Thousand or millions of computers at your command
- Zues botnets infected over 3.6 million PCs
- Coordinated attack
- The attackers are zombies
- Many people have no idea they’re participating
14
Q
Brute Force
A
- The password is the key
- Secret phrase
- Stored hash
- Online - Brute force attacks
- Keep trying the login process (very slow)
- Most account lockout after a certain amount of attemps
- Offline - Brute force the hash
- Obtain the list of users & hashes
- Calculate a password hash , compare it to stored hash
15
Q
Dictionary Attack
A
- People use common words as passwords
- Can find them in the dictionary
-If using Brute Force , start with the easy ones
- Common wordlists available online
- Some customized by language or line of work
- This will catch low hanging fruit
- Smart attacks need for smart people