Domain 3: System vuln, threats, countermeasures | Web Architecture Flashcards

(35 cards)

1
Q

Emanations

A

energy that escapes electrical systems. Can be used to reverse engineer processes/data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Covert Channel

A

any comms that violate sec. policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

covert storage channels

A

Use shared storage, to allow two subjects to signal each other. can be coded or not.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Covert timing channels

A

Uses system clock to infer sensitive infor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Backdoor

A

shortuct into a system allowing auser to bypass security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Maintenance hook

A

intentional backdoor installed typically in the prototyping process. should always be removed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Virus

A

Doesn’t spread automatically. Requires a carrier (usually human).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Macro virus

A

Written in macro language - such as Word or Excel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Boot sector virus

A

Infets the boot sector so that the virus starts on pc start up.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Stealth virus

A

hides itself from OS and antivirus software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Polymorphic virus

A

Changes its’ signature every time it enters a new system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Multipartite virus

A

spreads via multiple vectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Worm

A

malware that Spreads automatically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Trojan

A

Malware that hides itself as a benign app - like a game.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

rootkit

A

replaces portions of the kernel and/or os.

Kernel rootkit -operates in ring 0
OS rootkin - operates in ring 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Packers

A

utility that provides compression of executables. Can be used to avoid signature based detection.

17
Q

Logic bomb

A

malicious program that triggers when a logical condition is met. i.e time, number of transactions, number of cpu cycles, etc.

18
Q

Antivirus software

A

signature based or heuristic based

19
Q

server side attacks

A

Launched from an attacker to a server.

20
Q

client side attack

A

when a victim/user downloads malicious content.

21
Q

WEb architecture and attacks

A

As the web becomes more complex - the attack surface also gets larger.

22
Q

Applets

A

small pieces of mobile code that are embedded in other software like web browsers.

23
Q

Java

A

Applet form sun microsystems.

runs in sandbox increases functionality of web browser

24
Q

ActiveX

A

microsoft version of java

25
OWASP
open web app security project
26
XML
extensible markup language
27
SOA
service oriented architecture. Intends to reduce application architecture down to a functional unit of service.
28
polyinstantiation
allows two different objects to have the same name in a database.
29
Inference and aggregation
attacker uses lower level access to learn restricted info.
30
data mining
searches large sets of data to look for patterns.
31
Data analytics.
Used by sec professionals to understand normal operations.
32
countermeasures
defense in depth. multiple overlapping controls
33
mobile device attacks
used to carry malware into a secure area.
34
mobile device defense
clearly defined byod policies.
35
remote wipe
ability to remotely wipe a company device