Domain 3: System vuln, threats, countermeasures | Web Architecture Flashcards

1
Q

Emanations

A

energy that escapes electrical systems. Can be used to reverse engineer processes/data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Covert Channel

A

any comms that violate sec. policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

covert storage channels

A

Use shared storage, to allow two subjects to signal each other. can be coded or not.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Covert timing channels

A

Uses system clock to infer sensitive infor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Backdoor

A

shortuct into a system allowing auser to bypass security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Maintenance hook

A

intentional backdoor installed typically in the prototyping process. should always be removed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Virus

A

Doesn’t spread automatically. Requires a carrier (usually human).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Macro virus

A

Written in macro language - such as Word or Excel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Boot sector virus

A

Infets the boot sector so that the virus starts on pc start up.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Stealth virus

A

hides itself from OS and antivirus software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Polymorphic virus

A

Changes its’ signature every time it enters a new system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Multipartite virus

A

spreads via multiple vectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Worm

A

malware that Spreads automatically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Trojan

A

Malware that hides itself as a benign app - like a game.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

rootkit

A

replaces portions of the kernel and/or os.

Kernel rootkit -operates in ring 0
OS rootkin - operates in ring 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Packers

A

utility that provides compression of executables. Can be used to avoid signature based detection.

17
Q

Logic bomb

A

malicious program that triggers when a logical condition is met. i.e time, number of transactions, number of cpu cycles, etc.

18
Q

Antivirus software

A

signature based or heuristic based

19
Q

server side attacks

A

Launched from an attacker to a server.

20
Q

client side attack

A

when a victim/user downloads malicious content.

21
Q

WEb architecture and attacks

A

As the web becomes more complex - the attack surface also gets larger.

22
Q

Applets

A

small pieces of mobile code that are embedded in other software like web browsers.

23
Q

Java

A

Applet form sun microsystems.

runs in sandbox increases functionality of web browser

24
Q

ActiveX

A

microsoft version of java

25
Q

OWASP

A

open web app security project

26
Q

XML

A

extensible markup language

27
Q

SOA

A

service oriented architecture.

Intends to reduce application architecture down to a functional unit of service.

28
Q

polyinstantiation

A

allows two different objects to have the same name in a database.

29
Q

Inference and aggregation

A

attacker uses lower level access to learn restricted info.

30
Q

data mining

A

searches large sets of data to look for patterns.

31
Q

Data analytics.

A

Used by sec professionals to understand normal operations.

32
Q

countermeasures

A

defense in depth. multiple overlapping controls

33
Q

mobile device attacks

A

used to carry malware into a secure area.

34
Q

mobile device defense

A

clearly defined byod policies.

35
Q

remote wipe

A

ability to remotely wipe a company device