ch15 Flashcards
(43 cards)
computer system is attacked for one of two general reasons:
- Specifically targeted by an attacker –
* Attacker chose the target not because of the hardware or software the organization is running, but
for another reason, such as a political reason. - A target of opportunity.
* launched against a site that has hardware or software that is vulnerable to a specific exploit.
Minimizing Possible Avenues of Attack:
- By understanding the steps an attacker can take, you can limit the exposure of your
system and minimize the possible avenues an attacker can exploit. - By limiting the number of services that are running on the system (to provides two
safeguards: it limits the possible avenues of attacks, and it reduces the number of
services the administrator has to worry about patching in the first place). - By limiting public disclosure of private information about your organization and its
computing resources.
Malicious code (Malware)
refers to software that has been designed for some nefarious purpose.
- Malware include viruses, trojan horses, logic bombs, spyware, and worms, and ransomware.
Multipartite
When malware has multiple different objects that it specifically
attacks.
Polymorphic
Many types of malware can include a changing encryption layer to
resist pattern-matching detection.
Metamorphic
If the malware actually changes the code at the time of infection
Types of Malicious Software
- Ransomware
- Trojan Horses
- Worms
- Viruses
- Botnets
- Logic Bombs
- Spyware
- Adware
- Rootkit
- Backdoors and Trapdoors
Ransomware
- Ransomware is a form of malware that locks the user out of their files
or even the entire device until an online ransom payment is made to
restore access. - In most cases, the best solution is to have a complete and accurate
backup available to recover the lost files.
Trojan Horses
A trojan horse, or simply trojan, is a piece of software that appears to
do one thing (and may, in fact, actually do that thing) but hides some
other functionality.
Worms
- Worms are pieces of code that attempt to penetrate networks and
computer systems. Once a penetration occurs, the worm will create a new
copy of itself on the penetrated system.
Viruses
- A virus is a piece of malicious code that replicates by attaching itself to
another piece of executable code. When the other executable code is run,
the virus also executes and has the opportunity to infect other files and
perform any other nefarious actions it was designed to do.
Botnets
- Hackers create armies of machines by installing malware agents on the
machines, which then are called zombies. - These collections of machines are called botnets.
- These zombie machines are used to conduct other attacks and to spread
spam and other malware.
Logic Bombs
- Logic bombs are a type of malicious software that is deliberately installed
by an authorized users and, in particular, by administrators who are also
often responsible for security. - A logic bomb is a piece of code that sits dormant for a period of time until
some event invokes its malicious payload.
Spyware
- Spyware is software that “spies” on users, recording and reporting on their
activities. Typically installed without user knowledge. - Spyware can perform a wide range of activities:
- It can record keystrokes (keylogging) when the user logs in to specific
websites. - It can monitor how a user uses a specific piece of software (for example,
monitoring attempts to cheat at games).
Adware
- Software that is supported by advertising is called adware.
- Adware can also refer to a form of malware that is characterized by
software that presents unwanted ads.
Rootkit
- Rootkits are a form of malware that is specifically designed to modify the
operation of the operating system in some fashion to facilitate nonstandard
functionality. - Rootkits modify the operating system kernel and supporting functions.
- Rootkits are designed to avoid the security functions of the operating system.
Backdoors and Trapdoors
- Backdoors are methods used by software developers to ensure that they can gain
access to an application even if something were to happen in the future to
prevent normal access methods. - Also, Backdoor refers to programs that attackers install after gaining unauthorized
access to a system to ensure that they can continue to have unrestricted access
to the system, even if their initial access method is discovered and blocked.
Malware in all forms—virus, worm, spyware, botnet, and so on—can
be defended against by following these simple steps:
** check p10
* Use an antivirus/anti-malware program.
* Keep your software up to date.
Attacks on computer systems and networks can be grouped into two
broad categories:
- Attacks on specific software such as an application or the
operating system (which are generally possible because of a defect
in the design or implementation of the software). - Attacks on a specific protocol or service (which attempts to take
advantage of a specific feature of the protocol or service or to use
the protocol or service in a manner for which it was not intended).
Types of Computer and Network Attack
- Denial-of-Service Attacks (DoS Attack)
- Sniffing
- Spoofing
- TCP/IP Hijacking (Session Hijacking)
- Man-in-the-Middle Attacks
Denial-of-Service Attacks (DoS Attack)
is an attack designed to prevent a system or service from functioning normally.
- In a DoS attack, the attacker attempts to deny authorized users access
either to specific information or to the computer system or network itself.
* This can be accomplished by crashing the system—taking it offline—or by sending so
many requests that the machine is overwhelmed.
DOS Examples:
- SYN Flood: a website gets a lot of attention in a very short amount of time)
- Distributed Denial-of-Service (DDoS): Dozens or even hundred of computers
(known as zombies) are compromised, loaded with DOS attack software, and then
remotely activated by the hacker to conduct a coordinated attack. - Smurf: attacker sends a spoofed packet to the broadcast address for a network,
which distributes the packet to all systems on that network.
To defend against DoS attacks:
- Make sure that you have applied the latest patches and
upgrades to your systems and the applications running
on them. - Change the timeout option for TCP connections so that
attacks such as the SYN flooding attack are more difficult
to perform, because unused connections are dropped
more quickly. - Distribute your own workload across several systems so
that any attack against your system would have to target
several hosts to be completely successful. - To prevent a DDoS attack, you must either be able to
intercept or block the attack messages or keep the DDoS
network from being established in the first place.