Threats, Vulnerabilities, Attacks Flashcards

1
Q

Worm

A
  • Malicious software, like a virus, but is able to replicate itself without user
    interaction
    -> Worms self-replicate and spread without a user’s consent or action
    -> Worms can cause disruption to normal network traffic and computing
    activities
    -> Example
    • 2009: 9-15 million computers infected with conficker
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Virus

A

*Malicious code that runs on a machine without the user’s knowledge and
infects the computer when executed

*Viruses require a user action in order to reproduce and spread

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Trojan Horse

A
  • Malicious software that is disguised as a piece of harmless or desirable software.
  • Trojans perform desired functions and malicious functions.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

RAT

A

Remote Access Trojan:

  • Provides the attacker with remote control of a victim computer and is the most commonly used type of Trojan.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ransomware

A
  • Malware that restricts access to a victim’s computer system until a ransom is received
  • Ransomware uses a vulnerability in your SW to gain access and then encrypts your files.

(Example: $17 million: SamSam cost the City of Atlanta)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Spyware

A

Spyware is malware that secretly gathers information about the user without their consent.

*It captures keystrokes made by the victim and takes screenshots that are sent to the attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Adware

A

Displays advertisements based upon its spying on you

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Grayware

A

Software that isn’t benign nor malicious and tends to behave improperly without serious consequences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Rootkits

A

Rootkit is SW designed to gain administrative level control over a system without detection.

DLL injection is commonly used by toolkits to maintain their persistent control.

Rootkits are activated before booting the operating system and are difficult to detect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DLL

A

A type of Rootkit where malicious code is inserted into a running process on a Windows machine by taking advantage of Dynamic Link Libraries that are loaded at runtime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Driver Manipulation

A

A type of Rootkit attack that relies on compromising the kernel-mode device drivers that operate at a privileged or system level

*A shim is placed between two components to intercept calls and redirect them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Spam

A

Spam is activity that abuses electronic messaging systems, most commonly through email.

**Spammers often exploit a company’s open mail relays to send their messages.

***CAN-SPAM Act of 2003

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Summary of Malware (name some)

A
  • Virus
  • Worm
  • Trojan
  • Ransomware
  • Spyware
  • Rootkit
  • Spam
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Where does Malware usually start?

A

Typically, Malware infections start within SW, messaging, and media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Watering Holes

A

Watering Holes is a method of a Malware attack:

Malware is placed on a website that you know your potential victims will access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Botnet

A

A collection of comprised computers under the control of a master node

Note: Botnets can be utilized in other processor intensive functions and activities

17
Q

Active Interception

A

Occurs when a computer is placed between the sender and receiver and is able to capture or modify the traffic between them.

18
Q

Privilege Escalation

A

Occurs when you’re able to exploit a design flaw or bug in a system to gain access to resources that a normal user isn’t able to access

19
Q

Backdoor

A

Backdoors are used to bypass normal security and authentication functions.

Remote Access Trojan (RAT) is placed by an attacker to maintain persistent
access

20
Q

Logic Bomb

A

Malicious code that has been inserted inside a program and will execute
only when certain conditions have been met

21
Q

Easter Egg

A

Non-malicious code that when invoked, displays an insider joke, hidden
message, or secret feature

22
Q

IAW secure coding standards, should Logic Bombs and Easter Eggs be used?

A

No.

23
Q

Symptoms of Infection

A
  • Hard drives, files, or applications are not accessible anymore
  • Strange noises occur
  • Unusual error messages
  • Display looks strange
  • Jumbled printouts
  • Double file extensions are being displayed, such as textfile.txt.exe
  • New files and folders have been created or files and folders are missing/corrupted
  • System Restore will not function
24
Q

Removing Malware

A

Removing Malware:

o Identify symptoms of a malware infection
o Quarantine the infected systems
o Disable System Restore (if using a Windows machine)
o Remediate the infected system
o Schedule automatic updates and scans
o Enable System Restore and create a new restore point
o Provide end user security awareness training
o If a boot sector virus is suspected, reboot the computer from an external
device and scan it

25
Q

Preventing Malware

A

o Worms, Trojans, and Ransomware are best detected with anti-malware
solutions

o Scanners can detect a file containing a rootkit before it is installed…

o …removal of a rootkit is difficult and the best plan is to reimage the machine

o Verify your email servers aren’t configured as open mail relays or SMTP open
relays

o Remove email addresses from website

o Use whitelists and blacklists

o Train and educate end users

o Update your anti-malware software automatically and scan your
computer

o Update and patch the operating system and applications regularly

o Educate and train end users on safe Internet surfing practices