Block 2 Part 7 - Dangerous Data Flashcards

1
Q

These three principles represent the core objectives of information security and are often referred to as the CIA triad:

What does the acronym stand for?

A

C = Confidentiality: Ensures that information is accessible only to those who have the proper authorization. It involves protecting data from unauthorized access or disclosure.

I = Integrity: Ensures the accuracy and reliability of data. It involves maintaining the consistency and trustworthiness of information by protecting it from unauthorized alterations.

A = Availability: Ensures that information and resources are available and accessible when needed. It involves ensuring that systems and data are reliably and promptly accessible to authorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Most bugs do not represent a security risk as they occur in non-critical software – but those in the heart of the ___________ _________, or bugs in programs requiring access to critical ____________, can endanger users’ security.

A

operating systems
critical systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are ‘zero days’?

A

Bugs unknown to software developers and security companies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Is a botnet a virus, malware or a worm?

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In a botnet, infected machines are called…?

A

Zombies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A botnet can also be called a Z______ a____.

A

A zombie army

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Botnets fall into two broad categories:
1. c______-____________
2. p______-t__-p_________

A

client-server
peer-to-peer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Click fraud

Click fraud uses software to simulate clicking on an a______. It has been used by companies to exaggerate the popularity of their sites or products, whilst other companies have used click fraud to cripple r_______ by forcing them to pay advertising fees for billions of fake clicks.

A

advert
rivals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Brute-force decryption

Passwords and other forms of secure data can be attacked by brute force. B________ share the task amongst many machines, allowing for faster decryption.

A

botnets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Bitcoin mining

New Bitcoins are produced through a complex mathematical process requiring huge amounts of computer power. Rather than invest in their own computers, criminals can use b_________ to create new Bitcoins.

A

botnets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Denial-of-service (DoS) attacks

DoS is a method of attacking computers by flooding their network connections with spurious d_____ that prevents legitimate traffic from being sent or received.

A

data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Distributed denial-of-service (DDoS) attacks

Botnets allow thousands or even millions of z_______ to collaborate in an attack

A

zombies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Antivirus software aims to detect, isolate and, if necessary, delete malware on a computer before it can harm data. Antivirus software uses several techniques to identify malware. The two most common are known as:

  1. s___________
  2. h_____________
A
  1. signatures
  2. heuristics
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A signature is a u_______ p_______ of d____ created by a malware program in a computer’s memory or in a file.

A

unique pattern of data

Antivirus programs may run invisibly in the background, looking for malware signatures in files either when they are downloaded or when they are accessed by opening a file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Although signatures are widely used by antivirus programs, they have two significant drawbacks.

  1. Malware authors regularly release new versions of their software at short intervals.
    Why?
  2. More sophisticated malware modifies its own program during the process of infecting new machines. These p___________ (or metamorphic) programs have the effect of automatically producing new signatures without affecting the operation of the malware itself.
A
  1. The new releases are designed to extend the vulnerability window. Making changes to malware inevitably changes its signature and effectively renders the program invisible to antivirus programs until the new signature can be incorporated into the application.
  2. polymorphic
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Unlike signatures, heuristics do not require specific knowledge about individual types of malware; they detect new malware, for which signatures do not exist, simply by their b_____________.

A

behaviour

17
Q

What is a ‘sandbox’?

A

Heuristics may also place the suspected malware in a ‘sandbox’ – a simulated computer within the antivirus program – and allow it to execute. Since the malware is trapped within the sandbox, its operation can be studied without endangering the actual computer.

18
Q

What is a downside of heuristics?

A

Heuristics rely on previous experience to identify dangerous software, radically new malware (which appears all too regularly) can pass unnoticed.

19
Q

Many antivirus programs use a combination of s_______ and h________ to offer maximum protection.

A

signatures and heuristics

20
Q
A