Week 7 - Malware Flashcards

1
Q

What is Malware?

A

Malware is software designed to perform malicious activities on a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is zero day malware?

A

Malware that exploits vulnerabilities that have not been patched yet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 3 types of Malware?

A

viruses, trojans and Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a virus?

A

a malicious executable code that multiplies itself by attaching to a host document

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a polymorphic virus?

A

A polymorphic virus mutates as it spreads to avoid detection, making it harder to identify using signature-based antivirus software.

it leaves a signature to indicate a file has been infected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the three main parts of a virus?

A
  • Concealment (hiding from detection)
  • Propagation (spreading to other files)
  • payload (carrying out malicious actions)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a logic bomb virus?

A

A logic bomb virus activates when specific conditions are met.

e.g
deleting files after a certain event occurs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a time bomb virus?

A

A time bomb virus activates at specified time or date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How else can we classify viruses?

A

Bases on the infection mechanism

could be a file infector, boot sector, email virus, operating system infection mechanism.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a worm?

A

a self-replicating malware program that spreads across networks without human interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a trojan?

A

malware disguised as harmless program that hides malicious software, like keyloggers or creates a backdoor for attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the three main areas of malware prevention and detection?

A
  • increasing user awareness (avoidance of downloading suspicious files)
  • technical solutions (intrusion detection, firewalls)
  • Antivirus software (identifies and removes malware from an infected computer)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does antivirus work?

A

use of virus dictionaries to search every file for known virus signatures

requires regular updates and not effective against polymorphic viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an integrity checker?

A

alerts the user when a very old file has been recently modified. helps detect damage caused by viruses but not before the infection happens.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is activity monitoring in antivirus software?

A

monitoring activities of all programs and looking for suspicious behavior. (file modification, boot up time taking longer than usual)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is quarantining in activity monitoring ?

A

where the suspected file is placed into a new location where it can’t impact the system

e.g

sandbox - a secure environment isolated from OS

17
Q

What is a tarpit in cybersecurity?

A

a security mechanism that intentionally delays network connections to a sever, slowing down malware spread

18
Q

How do tarpits help in mitigating worm infections?

A

slows the spread of worms by increasing the time it takes for infected packets to reach new hosts

19
Q

How do tarpits help mitigate Denial of Service (DoS) attacks?

A

slows down the response time for each incoming HTTP request in a DoS attack, without impacting legitimate users, thus slowing the DoS attack.

20
Q

What is a honeypot in cybersecurity?

A

a decoy computer system that is set up to attract attackers. contains no valuable information

21
Q

How do honeypots help gather information about attackers?

A

Appear to contain valuable information to lure attackers. allowing defenders to gather information about attacker’s methods and intentions

22
Q

What are the two types of Malware Analysis?

A

Static and Dynamic

23
Q

What is static analysis?

A

examining files for malicious intent without running the code.

24
Q

How do we use Static analysis?

A

tools like disassemblers and network analysers user to look at file names, hashes and IP addresses.

25
Q

What is a limitation of static analysis?

A

May miss complicated malware that only shows malicious behaviour during runtime

26
Q

What is dynamic analysis in malware detection?

A

executes suspected files in a controlled environment (sandbox)

27
Q

What is a limitation of dynamic analysis?

A

attackers have become skilled at detecting sandboxes and will use techniques to hide malicious code inside the sandbox

28
Q

How do we use dynamic analysis?

A

allows security professionals to observe malware behavior without letting it affect the system or network.

obtaining an understanding of the malicious code’s behaviour