Chapter 6 Flashcards
malicious software
Advanced persistent threat
cybercrime directed at business + political targets using wide variety of intrusion technologies + malware , applied persistently + effectively to specific target over extended period , often state-sponsored
Malware
program inserted into system covertly with intent to compromise confidentiality , integrity or availability of victim’s data , applications or OS or otherwise annoy/disrupt victim
Adware
advertising integrated into software - result in pop-up ads/redirection of browser to commercial site
attack kit
set of tools for generating new malware automatically using variety of supplied propagation + payload mechanisms
- Zeus
auto-rooter
malicious hacker tool used to break into new machines remotely
backdoor/trapdoor
mechanism bypassing normal security checks - allow unauthorized access to functionality in program / compromised system
downloaders
code that installs other items on machine that is under attack - normally included in malware code first inserted on compromised system to then import larger malware package
drive-by-download
attack using code in compromised web site - exploits browser vulnerability to attack client system when site = viewed
exploits
code specific to single/set vulnerability
flooders
used to generate large volume of data to attack networked computer systems by carrying out sort of DOS attack
keylogger
logs keystrokes on compromised system - typically includes filter only returns info close to keywords
logic bomb
code inserted - lies dormant until predefined condition met - code triggers unauthorized act
macro virus
type of virus that uses macro/scripting code - embedded in document + triggered when document viewed/edited to run + replicate itself into other documents
mobile code
software can be shipped unchanged to heterogeneous collection of platforms + execute with identical semantics
rootkit
set of hacker tools used after attacker has broken into computer system + gained root-level access
spammer program
use to send large volumes of unwanted emails
spyware
software collect info from computer + transmits to another system by monitoring keystrokes ,screen data + network traffic /scan files on system for sensitive data
trojan horse
computer program appears to have useful function but also hidden + potentially malicious function that evades security measures - exploit legitimate authorization of system entity that invokes trojan horse program
virus
malware when executed tries to replicate into other executable machine/script code when succeeds = infected . When infected code =executed - virus also executed
worm
computer program can run independently + can propagate complete working version of itself on other host on network , usually by exploiting software vulnerabilities in target system
zombie/bot
program activated on infected machine that is activated to launch attacks on other machines
classification of malware
- how spreads to reach target
- actions/payloads
- parasitic code
- independent
- does not replicate
- does replicate
propagation mechanisms
- infection of existing content by viruses that spread to other systems
- exploit of software vulnerabilities to allow malware to replicate
- social engineering attacks
payload actions
- corrupt system files
- theft of service
- theft of info
- hiding presence on system