Vulnerabilities Flashcards

1
Q

What is a threat?

A

A circumstance that has the potential to cause harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an exploit?

A

An activity that takes advantage of a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is malware?

A

Malicious software that encodes and exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an attack?

A

A vector - mechanism or entry route for an exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why are international standards applied to systems?

A

Used to prove that risks have been accounted for and attempts to mitigate them have been made

COVER YOUR ASS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What factors are taken into account in risk analysis?

A

Subject: Person or process
Object: The what, data, file, process
Mode: Way of access/exploiting
Policy: The how who/what/how and possibly when

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What forms can threats come in?

A

Malicious or non-malicious
Huiman or bot
Directed or random

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the four kinds of threats?

A

Interception
Interruption
Fabrication
Modification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can threats be reduced?

A
Multi-level authentication
Principle of least privilege
Fail securely
Use of security policies
Adherence of standards
Continuous risk assessment
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a virus?

A

Program that infects other programs or files, often also has a replication mechanism

Contains payload which can make changes to the user’s system, create backdoors or leak data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a trojan virus?

A

Virus that poses as a legitimate application but is indeed a virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is a logic bomb?

A

Virus that waits for a trigger, such as opening a file, at which point it violates a security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a worm virus?

A

Virus that replicates and spread through a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a rabbit virus?

A

A virus that multiplies rapidly to fill up system resources ie IP tables, Ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a botnet?

A

A network in which a virus has allowed for a large number of connected devices to be controlled.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What was the code red virus?

A

2001, exploited buffer overflow on IIS web servers to DoS the white house and create a backdoor

17
Q

What was the mydoom virus?

A

Affected 250,000 systems in a day

Files attached to infected messages which, once opened, created a TCP connection and caused a DDoS.

18
Q

What was the storm virus?

A

2007, spread by using headlines of articles. Created a backdoor and a P2P botnet that shared list of hosts.

19
Q

What is a boot sector infector?

A

Loads programs on boot by changing the config of a bootloader

20
Q

What is an executable infector?

A

Virus code inserted into a program that is executed propr to the execution of the actual code

21
Q

What is a TSR virus?

A

Stay in memory after the application has been exited. These can execute at random times and interfere with signal interrupts

22
Q

What is adware?

A

Advertisement virus that causes popups, and sometimes come with keyloggers and spyware

23
Q

What is spyware?

A

Monitor keystrokes and internet usage, privacy-invasive.

24
Q

What is spam?

A

Unsolicited and unprecedented amount of Email, IM and other post methods of communication

25
Q

What was the Marai botnet and how was it used?

A

Marai botnet infected IoT devices and used them to create point-to-point connections between the devices and the DYN systems.

Largest ever DOS attack on the Dyn servers that host a large amount of the world’s traffic.

Height of attack seen traffic of 620Gbps to the servers.

26
Q

What was the wannacry virus?

A

Exploit that took advantage of old windows installations. Encrypted the filetable and demanded payment for the decryption of the files and file table.

Massively impacted NHS trusts.

Spread ended when another hacker registered a domain that was used as a killswitch by the virus once calls could be made to it.