Chapter 8 - Malicious Software Flashcards

1
Q

Malicious software (malware)

A

any program that contains instructions that run on a computer system and perform operations that the user does not intend

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does malware attack all three tenets of cybersecurity

A
  1. Confidentiality - malware can disclose your organization’s private information
  2. Integrity - malware can modify database records, either immediately or over a period of time
  3. Availability - malware can erase or overwrite files or inflict considerable damage to storage media
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

System infectors

A

target computer hardware and software startup functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

File infectors

A

attack and modify executable programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Examples of executable programs

A

COM, EXE, SYS, and DLL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data infectors

A

attack document files containing embedded macro programming capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Lifecycle of a virus

A

Virus is dormant -> the user transmits an infected object to another computer -> the virus locates and infects suitable objects on the new computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Rootkits

A

malware that modifies or replaces one or more existing programs to hide the fact that a computer has been compromised

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Rootkits are…

A

difficult to detect and remove

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Ransomware

A

attempts to generate funds directly from a computer user by limiting access to data through encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Spam

A

consumers computing resources bandwidth and central processing unit (CPU)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why is spam dangerous?

A

Diverts IT professionals from more critical activities and may contain malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Worms

A

self-contained programs designed to propagate from one host machine to another using the host’s own network system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How are worms different from viruses?

A

Unlike viruses, they do not require a host program to survive and replicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Trojan horses

A

programs that masquerade as useful programs while hiding malicious intent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Trojan horses are…

A

the largest class of malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How do trojan horses spread

A

through emails, website downloads, social networking sites, and bots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Logic bombs

A

programs that execute a malicious function of some kind when they detect certain conditions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Logic bombs can…

A

cause immediate damage or can initiate a sequence of events that cause damage over a longer period

20
Q

Logic bombs typically originate from…

A

organization insiders because they have more detailed knowledge of the IT infrastructure

21
Q

Active content

A

dynamic objects that do something when the user opens a webpage

22
Q

Vulnerabilities of active content

A

Users inadvertently download bits of mobile code which gain access to the hard disk and do things like fill up the desktop with infected file icons

23
Q

Add-ons

A

companion programs that extend the web browser

24
Q

Malicious add-ons

A

browser add-ons that contain some type of malware

25
Botnets
robotically controlled networks that perform various functions
26
Botnets can be used to...
distribute malware and spam; to launch DoS attacks
27
DoS attacks
overwhelm a server or network segment to the point that the server or network becomes unusable
28
Distributed denial-of-service attacks (DDoS)
use intermediary hosts to conduct the attack
29
Synchronize (SYN) flood attacks
attacker uses IP spoofing to send a large number of packets requesting connections to the victim computer
30
Smurf attack
attackers forge ICMP echo request packets from remote locations to generate DoS attacks
31
Spyware
any unsolicited background process that installs itself on a user's computer and collects information about the user's browsing habits and website activities
32
Adware
triggers nuisances such as popup ads and banners when a user visits certain websites
33
Why is adware dangerous...
Affects productivity and collects and tracks information
34
Phishing
tricks users into providing logon information on what appears to be a legitimate website but is actually a website set up by an attacker to obtain this information
35
Spear phishing
attacker supplies information about the victim that seems to come from a legitimate company
36
Pharming
the use of social engineering to obtain access credentials such as usernames and passwords
37
Keystroke loggers
capture keystrokes or user entries and forward the information to the attacker
38
Why are keystroke loggers dangerous?
they allow the attacker to capture logon information, banking information, and other sensitive info
39
Homepage hijacking
exploiting a browser vulnerability to reset the homepage and then installing a browser helper object trojan program
40
Webpage defacements
someone gaining unauthorized access to a web server and altering the index page of a site on the server
41
Phases of an attack
Reconnaissance, gaining access, maintaining access, and covering your tracks
42
Defense in depth
the practice of layering defenses into zones to increase the overall protection level and provide more reaction time to respond to incidents
43
Application defenses
implement antivirus screening, ensure that applications are up to date, install firewalls
43
Operating system defenses
deploy change-detection and integrity-checking software, ensure that all operating systems are consistent, disabling unnecessary services
43
Network infrastructure defenses
use proxy services, use content filtering, disable any unnecessary network services