Domain 3: System Vulnerabilities Flashcards
Method that is used to pass info over a path that is not normally used for communication
Covert Channels
Shortcut in a system that allows a user to bypass security checks, such as username/password
Backdoor
Backdoor installed by developers to bypass normal system checks during development such as authentication
Maintenance hooks
- Virus written macro language
- i.e. Microsoft Office
Macro Virus
Virus that infects the boot sector of a PC, which ensures that the virus loads upon system startup
Boot Sector Virus
Virus that changes itself from the OS and other protective software i.e. antivirus software
Stealth Virus
Virus that changes its signature upon infection of a new system, attempting to evade signature based antivirus software
Polymorphic Virus
Virus that spreads via multiple vectors
Multipartite Virus
Malware that self-propagates
Worms
Malware disguised as a legitimate program
Trojans
Malware that replaces portions of the kernel and/or OS
Rootkits
- Neutral technology used to shrink the size of executables
- Often used in malware to evade signature-based malware detection
Packers
- Malware that is triggered when a logical condition is met
- i.e. after a set number of transactions, or on a specific data
Logic bombs
Antivirus that uses static signatures of known malware
Signature-based antivirus
Anomaly-based detection used to identify behavioral characteristics of malware
Heuristic-based antivirus
Attacks launched directly from an attacker (the client) to a listening service
Server-side attacks
Attack that initiates from the victim who downloads content from the attacker
Client-side attacks
- Small pieces of mobile code that are embedded on other software such as web browsers
- Programming languages Java and ActiveX
Applets
Applets that are in a sandbox which segregates the code from the OS
Java
- Applets that use digital certificates to provide security
- Only works on Windows OS
ActiveX
Provides consensus guidance on what are considered to be the 10 most significant application security risks
Open Web Application Security Project (OWASP) Top 10 Project
Language used to store application configuration and output from auditing tools
Extensible Markup Language (XML)
- Reduces application architecture down to a functional unit of service
- Service can be used and reused throughout an organization rather than built within each individual application
Service-Orientated Architecture (SOA)
- Allows two different objects to have the same name
- i.e. Two rows may have the same primary key, but different data
Polyinstantiation