Definitions Flashcards
(102 cards)
Phishing
social engineering with a touch of spoofing - college access credentials
Prepending
the beginning of a URL has the error ex: theverge.com. vs ttheverge.com
Pharming
redirecting a legit site to a bogus site - poisoned DNS server or client vulnerabilities - Harvest large groups of people. RARE, and hard for anti-malware to stop.
SPIM
SPAM via instant messaging
watering hole
infect a website or site that employees go to that you want to target. That way you can collect their information from the 3rd party’s hacked website. Usually well trained employees who won’t click on phishing emails or open any attachments.
tarpitting
slowing down a server on purpose to make it harder and more annoying for spammers to send messages. It also slows their servers down and they would rather just try screwing with someone else.
viruses
- Malware that can reproduce itself.
- It requires you to execute a program.
- Reproduces through file system or the network.
- May or may not cause problems.
Program virus
- Part of an application
Boot sector virus
- In the boot sector of the virus. When you start OS, the virus is activated.
Script virus
OS and browser-based
Macro virus
Common in MS Office
Fileless virus
Operates in RAM, can avoid antivirus software since it is not written to the storage drive. Can auto-start each time you boot your computer.
Worm
- Type of virus that doesn’t need any user intervention.
- Moves from system to system without user intervention.
- Once ID’d and a signature created, it can be stopped at the firewall or the IPS.
Trojan
- Pretends to be something else and looks like normal software.
- Can disable your security tools.
- Can configure backdoors or download additional malware to install on your system.
PUP
Potentially Unwanted Program - may not be malicious, but could be undesirable and may cause performance problems on your computer. (toolbar, backup utility with tons of ads, etc)
Remote Access Trojan (RAT)
Also called a Remote Administration Tool. - the ultimate backdoor. Can take pretty much full control of your system.
Rootkits
modify core system files, won’t see it in task manager. Invisible to traditional anti-virus utilities.
Spyware
Can have keyloggers
Bots (Botnet)
Usually get on your computer through an OS or application vulnerability. Relay spam, proxy network traffic, distributed computing tasks. Can be for sale creating DDoS as a service in itself!
Logic bomb
Occurs when a separate event is triggered (usually a time bomb), but could be from placing something in a folder, or even just turning off the computer.
Logic bombs follow a particular signature so it’s easy to identify
FALSE
How to prevent logic bombs
- Have formal change control processes and procedures
- Electronic monitoring that scans for specific changes. (tripwire)
hashed passwords
The cryptographic algorithm cannot be reversed. Best way to store passwords. The hash algorithm is different across OSes and applications.
spraying attack
When someone uses the top common passwords to try to break into an account. If they don’t succeed after 3 tries, they just move on to the next potential victim. This avoids any alerts, lockouts, etc.