Section 1.0 Threats, Attacks, and Vulnerabilities - 21% Flashcards

1
Q

Malicious software - Can be very bad

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Gather Information - Keystrokes

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Participate in a Group - Controlled over the internet

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Show you some kind of advertising - Big Money

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Viruses, Crypto…, Ransomware, Worms, Trojan Horse, Rootkit, Keylogger, Adware, Spyware, Botnet are types of :

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Virus and Worms - Encrypt your data, Ruin your day.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How to get”Working together” - A worm takes advantage of a vulneravility, installs “something” that includes a remote access backdoor, Bot may be installed later:

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How to get “You must run” some sort of program from: Email link, unknown link, web page pop-up, by download, worm.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How to get “Causes” Operating System Vulnerable, OS without currents updates, Suspicious application, Infected Application, Adobe Flash vulnerability of the moment.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

It’s a type of Malware that can reproduce itself (It doesn’t have you to click anything, It needs you to execute a program).

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Reproduces through file system or the network (Just running a program can spread it).

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

May and may not cause a problem ( Some are invisible, some are annoying).

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Anti-… is very common, thousands of new “it” are created every week, your signature file has to be update to prevent it.

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Types of ( Program “…” - Part of the application, Boot sector “….” Who needs an OS?, Script “…” - Operating System and browser-based, Macro “…” - Common in Microsoft Office.

A

“…” Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

It’s a type of malware that self-replicates (Doesn’t need you to do anything, uses the network as a transmission medium/way/path, It self propagates and spreads quickly.

A

Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

It’s a pretty bad thing that can take over(take control) many system very quickly.

A

Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Firewalls and Intrusion Detection Systems (IDS)/Intrusion Prevention Systems (IPS) can mitigate/reduce many infestation of it, but doesn’t help much once the “it” gets inside.

A

Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

1 - Can replicate itself. 2 - Can reproduce itself.

A

1 - Worms, 2 - Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Your data is valuable/worth money (Personal Data: Family picutre and videos, important documents).

A

Ransomware and Crypto-Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Your data is valuable/worth money (Organization Data: Planning Documents, Employee personally Identifiable Information - PII, FInancial Information, Company Private Data.

A

Ransomware and Crypto-Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The bad guys want your money, they’ll take your computer in the meantime (kidnapping).

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Probable they will ask for a fake sum of money, locks your computer “ By the police”.

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

It may be avoided, a security professional may be able to remove these kinds of malware, it refers to kidnapping of data.

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Is a new generation of ransomware

A

Crypto-malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Your data is unavailable/inaccessible until you provide cash.

A

Crypto-malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Your data will be encrypted by a malware ( Pictures, music, movies, documents, etc) OS remains functional, You can see, but you can’t touch/open/execute.

A

Crypto-malware

27
Q

You MUST pay to release your data from it, impossible to trace.

A

Crypto-malware

28
Q

An unfortunate use of public-key “….”graphy.

A

Crypto-malware

29
Q

Types of protection: Offline Backup, Operational System Updated, Applications Updated, Anti-virus and anti-malware signatures updated (lalest versions).

A

Crypto-malware

30
Q

Remain the Greek history, used to capture the city of Troy. But this version is digital.

A

Trojan Horse

31
Q

Software that pretends to be something else, it wants to conquer or take control of your computer, it doesn’t care much about replicating.

A

Trojan Horse

32
Q

Malware that circumvents/avoid your existing security, anti-virus may catch it when it runs.

A

Trojan Horse

33
Q

The betters types of it are built to avoid and disable anti-virus (AV).

A

Trojan Horse

34
Q

Once it’s inside it has free reign/control/domain to give permission to others inside your OS.

A

Trojan Horse

35
Q

It’s a vulnerability of some softwares and OS, “Why go through normal authentication methods?

A

Backdoor

36
Q

It can be created by malwares and used by another malware who takes advantage of it.

A

Backdoors

37
Q

Bad softwares has it as part of the App, old linux kernel has it as well.

A

Backdoor

38
Q

Remote administration tools, the ultimate backdoor, administrative control of a device.

A

Remote Access Trojans (RATs)

39
Q

A malware will install the server/service/host, bad guys connect with the client software.

A

Remote Access Trojans (RATs)

40
Q

Control the device remotely (Key logging, Screen recording, screenshots, copy files) Can embed/insert more malware.

A

Remote Access Trojans (RATs)

41
Q

Originally a UNIX techinique, the “root”…

A

Rootkits

42
Q

Modifies core system files, Part of the kernel

A

Rootkits

43
Q

Can be invisble to the OS, you won’t see it in Task Manager,Also Invisible to traditional Anti-Virus (Av), if you can’t see it, you can’t stop it.

A

Rootkits

44
Q

Zeus and Zbot are types of it, they can be combined with Necurs who make sure that you won’t be able to delete Zbot.

A

Rootkits

45
Q

Common message “Erro terminating process: Access Denied” when you try to stop a Windows process.

A

Rootkits

46
Q

It can be recognised and finded by unusual comportements and scanning the computers with anti-malwares.

A

Rootkits

47
Q

A security boot with UEFI and establishing a security parameter in the BIOS can avoid be infected by it. Specific removers are developed after it has been discovered.

A

Rootkits

48
Q

Your keystrokes contain valuable information ( Web sites logins, passwords, email messages). It saves everything of your inputs and send to bad guys.

A

Keylogger

49
Q

It can circumvents encryption protections, your keystrokes are in the clear.

A

Keylogger

50
Q

Can capture Clipboard logging, screen logging, instant messaging, search engine queries.

A

Keylogger

51
Q

It’s usually installed with others malwares to capture your inputs, to avoid it you have to keep your AV updated, blocking unauthorized communication, sacanning for exfiltration attempt “unauthorized copying, transfer or retrieval of data from a computer or server”, reviewing firewall rules.

A

Keylogger

52
Q

Your computer as a big advertisement, Pop-ups with Pop-ups.

A

Adware

53
Q

Can cause downgrade of performance in your computer, especially when over the network.

A

Adware

54
Q

It’s usually installed accidentally, may be included in other softwares installations as part of the app.

A

Adware

55
Q

Some softwares will claim that they can remove “it”, especially if you learned about it from a Pop-up.

A

Adware

56
Q

Type of malware that will trick you into installing peer to peer, fake security software, motivated to monitoring what you are browsing, capturing surfing habits. Keylogger is a type of it.

A

Spyware

57
Q

Type of malware that aims to monitor your activity on the internet, with an objective to advertising, identity theft, affiliate fraud.

A

Spyware

58
Q

These two things exist because of money. What you are looking on the internet is valuable, your time using your computer and bandwidth is incredibly vulnerable, your account details is incredibly valuable.

A

Adware and Spyware

59
Q

Another name for Robot Networks

A

Botnets

60
Q

Once your machine is infected, it becomes a bot, you may even know

A

Botnets

61
Q

How does it get on your computer?
• Trojan Horse (I just saw a funny video of you! Click here.)
You run a program or click an ad you THOUGHT was legit, but…
• OS or application vulnerability
• A day in the life of a bot
• Sit around. Check in with the mother ship. Wait for instructions.

A

Botnets

62
Q

A group of bots working together

• Nothing good can come from this

A

Botnets

63
Q

DDoS (Disturbed Denial of Service) The power of many

A

Botnets