Week 10 Flashcards

IT Risk

1
Q

Planning Principles

A

Risk Analysis
Comprehensive
Security
Defence in depth
Minimum Permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Malware?

A

– A general name for evil software
– software intentionally designed to cause damage to
a computer, server, client, or computer network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Difference between Vulnerability-Specific and Universal Malware

A

– Vulnerability-specific malware requires a specific
vulnerability to be effective.
– Universal malware does not require a specific
vulnerability to be effectivere

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Riskware?

A
  • Usually offers some benefit at a “cost”
    – Compromises security
    – Acts illegally
  • Riskware might
    – Block another application
    – Be used as a backdoor for other malware.
    – Indicate the presence of other malware.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Social Engineering?

A

Tricking the victim into doing something against his
or her interests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Fraud?

A

Lying to the user to get the user to do something
against his or her financial self-interest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Spam?

A

– Unsolicited
commercial e-mail
– Often fraudulent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are E-Mail Attachments used for?

A

– link to a Website with
Malware
– This may complete
the fraud or download
software to the victim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are Phishing Attacks?

A

– Sophisticated social
engineering attacks

– authentic-looking e-
mail or Website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What do Phishers do?

A
  • Phishers
    – decide which business to target
    – how to get e-mail addresses for the customers of
    that business.
    – use the same mass-mailing and address collection
    techniques as spammers
  • Phisher targets
    – Banking e.g. Bank of Ireland
    – Payment services e.g. paypal
    – Social media e.g. Facebook
    – Government e.g. Revenue
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Credit Card Number Theft

A

– Performed by “carders”
– Make purchases with stolen credit card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Identity Theft

A

– Collecting enough data to impersonate
the victim in large financial transactions
– Can cause greater harm than carding
– May take a long time to restore the victim’s credit
rating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is vandalism/sabotage?

A

Deliberate damage to hardware, software and/or
data, including companies’ websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why are Disgruntled and Ex-Employees dangerous?

A

– Extensive access to systems, with privileges
– Knowledge about how systems work
– Knowledge about how to avoid detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a Logic Bomb?

A

– Destructive computer program that activates at a
certain time or in reaction to a specific event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Back Door

A

Section of program code that allows a user to
circumvent security procedures and gain full access
to the system

17
Q

What is hacking?

A

Hacking is intentionally using a computer
resource
– totally without authorisation
– or in excess of authorisation

18
Q

What is Ransomware?

A
  • Ransomware became
    one of the most
    common forms of
    malware. It works by
    – Infecting your O/S
    – Encrypting all data
    – Demanding a ransom
    in a digital currency
    – Typically, you have
    24 hours to pay.
19
Q

Ransomware Sequence

A
  • Distribution Campaign : phishing emails and
    websites trick users to download a dropper.
  • Malicious Code Infection : The dropper
    downloads an executable to install ransomware
  • Malicious Payload Staging ransomware
    embeds itself in the system.
  • Scanning : ransomware finds content to encrypt.
  • Encryption Files and folder are encrypted
  • Payday : A ransom note with instructions on how
    to pay the ransom. Victims are usually given a
    few days to pay the ransom or price will increase.
20
Q

What is a Denial of Service (DOS) Attack?

A

– Install bots in devices e.g. IOT