threats and attacks on endpoints Flashcards

1
Q

What is Malware?

A

Malware is a software that enters a computer system without the user’s knowledge or consent and then performs an unwanted and harmful action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which is true about Malware?

a) Malware is most often used as the general term to refer to a wide variety of damaging software programs.

b) Malware is continually evolving to avoid detection by improved security measures.

c) One attempt at classifying the diverse types of malware can be to examine the primary action that the malware performs.

d) All of the above.

A

d) All of the above.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Imprison?

A

Some types of malware attempt to take away the freedom of the user to do what they want.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What types of malware imprison?

A

Types of malware that imprison are ransomware and cryptomalware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is randomware?

A

Ransomware prevents a user’s endpoint device from properly and fully functioning until a fee is paid.

Some ransomware pretends to come from a law enforcement agency while others pretend to come from a software vendor and displays a fictitious warning that a license has expired.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is cryptomalware?

A

Cryptomalware is a type of malware that imprisons users and encrypts all files on the device so that none of them can be opened.

The cost for the key to unlock the cryptomalware increases every few hours or days.

New variant of cryptomalware encrypt all files on any network or attached device connected to that computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of malware launches?

A

Malware that infects a computer to launch attacks on other computers includes a virus, worm, and bot.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a virus?

A

There are two types of viruses: a file-based and fileless.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a file-based virus?

A

A file-based virus is malicious code that is attached to a file that reproduces itself on the same computer without any human intervention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an armored file-based virus?

A

An armored file-based virus goes to great lengths to avoid detection. Techniques include split infection and mutation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a fileless virus?

A

A fileless virus does not attach itself to a file but instead takes advantage of native services and processes that are part of the OS to avoid detection and carry out its attacks. It does not infect a file, instead the code is loaded directly in the computer’s random access memory (RAM).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are some advantages of a fileless virus over a file-based virus:

A

Easy to infect, expensive to control, persistent, difficult to detect and to defend against.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a worm?

A

A worm is a malicious program that uses a computer network to replicate (sometimes called a network virus).

Designed to enter a computer through the network and then take advantage of a vulnerability in an application or an OS on the host computer.

Today’s worms can leave behind a payload on the systems they infect and cause harm, much like a virus.

Actions that worms have performed include deleting files on the computer or allowing the computer to be remotely controlled by an attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a bot?

A

Another type of malware allows the infected computer to be placed under the remote control of an attacker for the purpose of launching attacks.

The infected robot computer is known as a bot or zombie.
When hundreds, thousands, or even millions of bot computers are gathered into a logical computer network, they create a botnet under the control of a bot herder.

Infected bot computers receive instructions through a command and control (C&C) structure from the bot herders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are two common types of snooping?

A

Spyware and keyloggers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is spyware?

A

Spyware is tracking software that is deployed without the consent or control of the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is keylogger?

A

A keylogger silently captures and stores each keystroke that a user types on the computer’s keyboard.

The threat actor can then search the captured text for any useful information such as passwords, credit card numbers or personal information.

A keylogger can be a software program or a small hardware device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What malware deceives?

A

Potentially unwanted programs (PUPs), Trojans, and remote access Trojans (RATs).

19
Q

What are Potentially Unwanted Programs (PUPs)?

A

A PUP is software that the user does not want on their computer.

20
Q

What are some example of PUPs?

A

Advertising that obstructs content or interferes with web browsing, pop-up windows, pop-under windows, search engine hijacking, home page hijacking, etc.

21
Q

What is a trojan?

A

A computer Trojan is an executable program that masquerades as performing a benign activity but also does something malicious.

22
Q

What is a Remote Access Trojan (RAT)?

A

A RAT has the basic functionality of a Trojan but also gives the threat agent unauthorized remote access to the victim’s computer by using specifically configured communication protocols.

This creates an an opening to the victim’s computer, allowing the threat agent unrestricted access.

23
Q

What is malware evading?

A

This category of malware attempts to help malware or attacks evade detection.
Includes backdoor, logic bomb, and rootkit.

24
Q

What is a backdoor?

A

A backdoor gives access to a computer, program, or service that circumvents any normal security protections.

25
Q

What is a logic bomb?

A

A logic bomb is computer code that is typically added to a legitimate program but lies dormant and evades detection until a specific logical event triggers it.

26
Q

What is a roofkit?

A

A roofkit is malware that can hide its presence and the presence of other malware on the computer.

It does this by accessing “lower layers” of the OS to make alterations.

27
Q

What are application attacks?

A

Application attacks look for vulnerabilities in applications or manipulates applications in order to compromise them.

Common targets of attackers using application attacks are internet web server.

28
Q

What is scripting?

A

In cross-site scripting (XSS) attack, a website accepts user input without validating it and uses that input in a response that can be exploited.

An attacker can take advantage in an XSS attack by tricking a valid website into feeding a malicious script to another user’s web browser.

29
Q

What is an in injection?

A

Attacks called injections introduce new input to exploit a vulnerability.

One of the most common injection attacks (SQL injection) inserts statements to manipulate a database server.

SQL injection targets SQL servers by introducing malicious commands into them.

By entering crafted SQL statements as user input, information from the database can be extracted or the existing can be manipulated.

30
Q

What is request forgery?

A

Request forgery is a request that has been fabricated.

31
Q

What are the two types of request forgeries?

A

Cross-site request forgery (CSFR) and a server-site request forgery(SSRF).

32
Q

What is a Cross-Site Request Forgery?

A

CSRF takes advantage of an authentication “token” that a website sends to a user’s web browser.

If a user is currently authenticated on a website and is then tricked into loading another webpage, the new page inherits the identity and privileges of the victim, who may then perform an undesired function on the attacker’s behalf.

33
Q

What is a Server-Site Request Forgery (SSRF)?

A
  • An SSRF takes advantage of a trusting relationship between web servers.
  • SSRF attacks exploit how a web server processes external information received from another server.
  • Some web applications are designed to read information from or write information to a specific URL
  • If an attacker can modify that target URL, they can potentially extract sensitive information from the application or inject untrusted input into it.
34
Q

What are replay attacks?

A

Replay attacks are commonly used against digital identities.

After intercepting and copying data, the threat actor retransmits selected and edited portions of the copied communications later to impersonate the legitimate user.

Many digital identity replay attacks are between a user and an authentication server.

35
Q

What are attacks on software?

A

Other attacks are directly focused on vulnerabilities in the software applications.

These include:
- Exploiting memory vulnerabilities.
- Improper exception and error handling.
- External software components.

36
Q

What are memory vulnerabilities?

A

Some memory-related attacks are called resource exhaustion attacks because they “deplete” parts of memory and thus interfere with the normal operation of the program in RAM

37
Q

What are some other memory-related attacks?

A

Buffer overflow attacks and integer overflow attacks.

38
Q

What is a buffer overflow attack?

A

A buffer overflow attack occurs when a process attempts to store data in RAM beyond the boundaries of a fixed-length storage buffer. This extra data overflows into the adjacent memory locations.

39
Q

What is an integer overflow attack?

A

In an integer overflow attack, an attacker changes the value of a variable to something outside the range that the programmer had intended by using an integer overflow.

40
Q

What is improper exception handling?

A

Some attacks are the result of poor coding on the part of software developers.

41
Q

What are some attacks on external software components?

A

Application program interface (API), Device driver,
Dynamic-link library (DLL)

42
Q

What is artificial intelligence (AI)?

A

The definitions of AI vary, but AI may be defined as technology that imitates human abilities.

43
Q

What is machine language (ML)?

A

ML is defines as “teaching” a technology device to “learn” by itself without the instructions of a computer programmer.

44
Q

What are some risks in AI and ML in cybersecurity (also known as adversarial artificial intelligence)?

A

The first risk is the security of ML algorithms (they could be compromised, allowing threat actors to alter algorithms and ignore attacks), another risk is tainted training data for machine learning.