Exam 1 Flashcards
(216 cards)
RFID
Radio frequency identification
malicious software that performs illegal actions unanticipated by a user running the software. They are intended to yield financial benefits to the distributer of the software.
Crimeware (subclass of malware)
Difference between hacker and cracker
Hacker is illegal
Cracker is illegal and looking for some type of gain
malicious software. Used for adware and spyware and destructive viruses. Between the line of criminal and being malicious.
Malware (legal and illegal)
HTTP
Hypertext transfer protocol
IP
Internet protocol
After computers send out a query. all computers have data but it is distributed through a central machine. Central machine has list of what computers have, and then send specific query to that node. The content search is facilitated by (replicated) central servers. All participants of such networks know the whereabouts of these servers. And the services keep track of which user has which file and use this info to direct querying users to the IP (Internet Protocol) addresses of holders of the content they want. When receiving a reply from the server the querying peer can directly download the content from one or more sources.
Centralized P2P
have peer to peer software. Can violate copyright property. Also target for malware. When a peer searches for a file, it sends a request with keywords to all nodes that it is connected (usually between four and seven). If they don’t have it, they forward it to the nodes they are connected too (hopcount)
Decentralized P2P
each peer that sees the query decrements the number of hops before forwarding it, so when it reaches zero the query is dropped
In decentralized P2P
Hopcount
Difference between decentralized and centralized P2P
Decentralized P2P send out a query with keywords to all nodes (between 4-7 nodes it is connected too). And hopcount
Centralized P2P: all participants know which user has a file
Sending out a request from computers
Query
Example of decentralized P2P. Hard to tell who started sharing software, etc. files are encrypted. Don’t know what you downloaded and there is no accountability
Freenet
2 phases of P2P networks
Query and download phase
The content search is facilitated by replicated central servers
Centralized P2P
decentralized P2P, have to hop through computers to see if they have the software (or whatever) instead of a central machine.
Hopcount
Defending against malware in P2P
rely on identifying malware through antivirus tools after the content has been download. Has shortcomings: an actual download of the entire file must occur (sandbox principle) and while antivirus software may prevent downloading the malware but it could still spread on the networks.
Query phase protection
builds quarantine area on your computer to download the software and determine if it has malware. Problem: lack of updates to keep track of new malware or might not be able to identify malware.
The filtering must be done only with knowledge about information contained in query responses —query string itself, file name, size and IP address of the offering peer
Sandbox
Scheme for human propagation:
Viral videos, games and fads
Referral to a location based on recommendation of peers. Cannot be stopped except by the human
Common feature of infection vectors:
quickly draw immense numbers of people to the site, and are then forgotten. Ideal for spreading malware
a compiled Java program that, when signed and authorized by a user, has more access to the user’s computer than standard parts of web pages such as JavaScript or HTML.
Applet
allowed to install programs on the client’s computer because they are given more access to users’ computers in the belief that people will properly authenticate a signed applet by checking the certificate before running it. But most people don’t.
Signed applets
Financial gain attacks
Spam, phishing and botnets
These usually steal usernames and passwords for financial web sites
Trojans, worms and viruses
attacks focused on obtaining financial returns in the context of RFID technology.
RFID crimeware
Radio frequency identification