Week 1 - Malicious Software Flashcards

1
Q

What does the acronym CIA stand for (not government)

[as in CIA triad]

A

C - Confidentiality
I - Integrity
A - Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does the CIA triad refer to?

A

it’s a guiding model for designing information security policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does confidentiality mean?

A

Keeping things hidden (from unwanted eyes)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does integrity mean?

A

Keeping data accurate and untampered with

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does availability mean?

A

The people who should have access to data, is readily accessible to them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How do you define risk?

A

The possibility of suffering a loss in an attack (on the system/device)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How do you define vulnerability?

A

A flaw in the system that’s exploited to compromise it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a 0-day/zero-day vulnerability?

A

A vulnerability that’s new/missed to a developer/vendor, but already discovered and exploited by an attacker

(the developer has had 0 days to fix it because it’s new to them)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an exploit?

A

software used by an attacker to target a specific vulnerability

[they write an exploit code]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do you define a threat?

A

possible attackers (burglars)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a hacker?

A

Someone who tries to break into and exploit a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the 2 common types of hackers?

A
  1. Black Hat
  2. White Hat
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What’s the difference between white hat and black hat hackers?

A

White hat hackers will find the weaknesses but will alert the owners so they can fix it. Black hat hackers are malicious.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an attack?

A

an actual attempt to harm a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is malware?

A

type of software that can steal your information and delete/modify files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does a virus work?

A

it comes attached to an executable code (program), spreads to other files when it’s running, replicates itself on the files, does damage, and tries to keep spreading

17
Q

What are worms?

A

Worms are like viruses except they can spread without attaching themselves onto something

18
Q

How are worms spread?

A

worms are spread through channels like networks

19
Q

What is adware?

A

software that displays advertisements and collects data

20
Q

What is a trojan?

A

malware that disguises itself as one thing but it actually does something else

21
Q

What is spyware?

A

malware that spies on you

22
Q

What’s an example of spyware?

A

monitors your screens, key presses, webcams and reports or streams this to another party

23
Q

What’s a keylogger?

A

A specific and common type of spyware that records your keystrokes

24
Q

What is ransomware?

A

a type of attack that holds your data/system hostage until you pay a ransom

25
Q

What are 3 symptoms that might indicate a system is infected with malware?

A
  1. Running slower than normal
  2. Restarts on its own many times
  3. Uses all or a higher than normal amount of memory
26
Q

What is a botnet?

A

compromised internet-connected machines perform tasks controlled by the attacker

27
Q

How do you separate an infected device from the rest of the network (botnet)? (3)

A

disconnect WiFi, unplug Ethernet, temporarily disable automatic system backup (might get re-infected by restoring infected file)

28
Q

What should you do after malware has been cleaned from the system?

A
  1. Turn the automatic backup back on
  2. Create a manual safe restore point
29
Q

What’s a backdoor?

A

A secret entryway that attackers install in an already compromised system to grant continued access even if the user is aware their system is compromised

30
Q

What is rootkit malware?

A

Allows admin-level modification to an OS

31
Q

Why is a rootkit so hard to detect?

A

It runs malicious processes while also hiding those processes from the task manager

32
Q

What is a logic bomb?

A

Malware that’s intentionally installed and triggered to run after a certain time or event