Threats and Vulnerabilities Flashcards

1
Q

Virus

A

MalwareReplicates itself on a systemCannot spread by itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Worms

A

Propagates on it’s ownNoes not need a host application to be transportedSelf Contained

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Trojan Horse

A

Program disguised as another programMay be included as an attachment or as part of an installation program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Logic Bomb

A

Malware inserted into a system which sets off an action when specific conditions are met.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Rootkits

A

Has ability to hid spyware blockers, anti-virus program and system utilities. Runs at root level or admin access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Backdoors

A

Bypass normal authentication methods. Full access to every aspect of the device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Ping-of-Death

A

ICMP packet that is larger than allowed >65500

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Land Attack

A

Creates packet with the same source and destination address. Creates a loop.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Teardrop Attack

A

Attacker creates a large packetOverlaps offset bits - packets never able to be reassembled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SYN Flood

A

Attacker sends succession of SYN requests to a target with bogus return address.Not effective against modern networks”half open handshake”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Smurf/Fraggle Attack

A

“broadcast attack”Attacker sends out ping with address of someone else’s address as return and have it sent to the broadcast address. Smurf=ICMP PacketsFraggle=UDP packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Session Hijacking

A

Type of man in the middle attack Takes control of an active TCP session by using sequence number guessing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Repudiation Attacks

A

Cannot tell who wrote it or where it came from.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Xmas Scan Attack

A

Conducted with XmasPacket with every option set for the protocol is in use. Assumptions made by how the computer responds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Spear Phishing

A

Email/IM scam
Particular target
Inside information needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Whaling

A

Spear phishing

Directed toward high profile figures in organization

17
Q

Transitive Access

A

Service that invokes another service to satisfy an initial request. Result of poor choice of access control mechanism (uses authentication to make access decisions). Tries another way when one isn’t successful.

18
Q

Buffer Overflow (what it is/safeguards)

A

More info than buffer can hold and then computer crashes.

Can create a DoS attack
Nop/Noop - Non-operational data

Safeguards: Input validations, patch/upgrade

19
Q

XSS (what it is/safeguards)

A

Cross-Site Scripting
Add comments/code to web pages which allows code injection.
Could redirect valid data somewhere else

Safeguard: Input validation, tie cookies to IP addresses

20
Q

SQL Injection (what it is/safeguards)

A

Code put in a database via web form
Allows an attacker to query data from database
DoS most common SQL
User ID = ‘ ‘ or 1=1

Safeguard: Input validation

21
Q

Transient vs Persistent Cookies

A

Transient: for current browsing session

Persistent: store for an extended period of time

22
Q

ActiveX (what it is/vulnerabilities/safeguards)

A

Microsoft mobile code that runs on the client

Authenticode:
Code signing mechanism, ID the publisher
Ensures hasn’t been tampered with before download

Vulnerabilities:
Controls saved to HDD
Execution depends on current user acct security level
Once accepted it is always accepted

Safeguards:
Patches
Do NOT allow to run by default

23
Q

Java Applets (what it is/vulnerabilities/safeguards)

A

Stand alone mobile code downloaded from server to a client.
Runs from browser

Sandbox:

  • Virtual machine architecture
  • Limits access to system resources
  • Digitally signed can run outside the sandbox

Vulnerabilities:

  • May be malicious
  • Errors may allow some to escape the sandbox

Safeguards:

  • Latest browser version
  • Patches
  • Disable
  • Limit browser plug-ins
24
Q

Fail Soft

A

Shuts down any nonessential components

25
Q

Black Box

A

Examines program from user perspective

Testers do not have access to internal code

26
Q

White Box

A

Examines the internal logical structures line by line

27
Q

Gray Box

A

Combines Black/White Box

Testers approach software as user and have access to the source code.

Develop tests to be run as user.

28
Q

EAP 802.1X

A

Authentication framework
NOT specific authentication mechanism

Used over PPP and WLANs

See Domain 4 slides pg. 90

29
Q

Protocol Analyzers (what they do/types of tools)

A

Hardware or software
Analyzes traffic and breaks it down for you

Tools: Wireshark, Snort, Kismet

30
Q

Penetration Testing (what it is)

A

Attempt to break into your own network by finding weaknesses. Assess amount of business impact if it’s successful.

Need written approval before attempting

31
Q

Vulnerability Scanning (what it is/what it does/tools that do it/scanners)

A

Software that compares system to database of known vulnerabilities.

Detects potential vulnerabilities.

Tools: Protocol analyzers, port scanners, network mappers, password crackers, vulnerability scanners.

Scanners: Nessus, SAINT, NMAP, Retina

32
Q

OVAL (what it is/when it’s used)

A

Open Vulnerability and Assessment Language

Used in vulnerability scanning.

33
Q

Network Mappers (what it is/tools that do it)

A

Used to create network maps

Tools: Nmap, Solar Winds, What’s Up Gold

34
Q

Port Scanners (what it does/tools that do it)

A

Probes for all enabled TCP/UDP ports

Tools: SuperScan, NMAP, Nessus