Lecture 2 Flashcards

(30 cards)

1
Q

What are the 2 types of threats?

A
  1. Malicious software known as “Malware”
  2. Intruder is known as “Attacker”
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is ​Adware?

A

Displays popups of advertising downloads when the user is online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an Attack kit?

A

A set of tools that generates new malware automatically using a **variety of propagation **

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Auto-rooter?

A

Used to break into new machines remotely – to the highest root to gain full access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Backdoor?

A

Bypass a normal security check via a compromised system such as using a password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are Downloaders?

A

Code that installs other items on the machine that is under attack. It is normally included in the malware code which is placed in a compromised system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Drive-by Download?

A

Uses a code to compromise a website to exploit a browser vulnerability to attack a client system the website is viewed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Flooders?

A

Generating a volume of data to attack a networked computer system by applying DOS attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Keyloggers?

A

captures keystrokes in a compromised system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Logic bomb?

A

A program that is timed to cause harm at a certain point of time. It stays inactive until the time comes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Marco Virus?

A
  1. Uses a set of macro commands used by other programs to perform a sequence of actions automatically.
  2. Typically embedded in a document and triggered when it is viewed or run or replicate itself into other documents
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Mobile code?

A

A code transferred between systems/across a network in an email, document, file or a website which is executed via a network or a storage device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Rootkit?

A

A set of hacker tools used after the attacker had broken into a computer and gained root-access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Spyware?

A
  • Monitors the user’s activity of your computer
  • Aims to gather information about a person or company
  • Sent it to another computer.
  • Scans the computer for files containing sensitive information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a Trojan horse?

A
  • Harmless by accessing a user’s computer but secretly infects the computer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Classification of Malware

A

Independent, self-contained = Worms, Trojans and bots

Malware DOES NOT replicate = Trojans and Spam emails

Replicates viruses and worms

17
Q

Propagation mechanisms

A
  1. Infection of existing content by **viruses **
  2. Exploit of software vulnerabilities by malware replication from worms or drive-by-downloads
  3. Social Enginnering to encourage users to bypass security to Install Trojans to respond to phishing attack
18
Q

What is a Virus?

A
  • Malicious software that replicates itself
  • Easily spread through other environments
  • When it is attached to an executable program, the virus can secretly execute when the program is run

Finding weakness in OS and Hardware

19
Q

Worm

A
  1. Self-replicates itself via networks rapidly to find sensitive data and converting them into ‘bots
  2. Exploits client/server programs
  3. Spread through storage devices (USB, HDDs)
20
Q

What are the 3 Intruder classes?

A
  1. Masquerader: OUTSIDER An ‘unauthorised’ user that pretends to be an identity/legit user to perform such act
  2. Misfeasor: INSIDER Legit user that misuse the privileges
  3. Clandestine user: EITHER OUTSIDER or INSIDER

Surpasses control to evade auditing and access controls to surpass audit collection

21
Q

Give Examples of intrusion

A
  • Compromise the root remotely
  • Damages Web server
  • Guess/crack passwords
  • Copy database containing credit card details
  • Viewing sensitive data without authorisation
  • Use unsecured modem to access internal network
  • **Use unattended workstation **
22
Q

What is a hacker?

A
  • Motivated to gain access
  • Hacking community has been very ‘Strong’ and ‘popular
  • Status is determined by level of competence
  • Intruders consume resources and slow performance for legit users
  • Uses Virtual Private Network (VPN)
23
Q

What are the attacker motivations?

A
  1. Hobbyists: Crackers and experts whose main motivation is the intellectual challenge of breaking into a system
  2. Financial gain
  3. Political: Nation state
  4. Military/Strategy: nation state actors
  5. Psychological: Causing doubt in population
24
Q

Examples of Attacks

A

DOS
Distributed denial of service
Cross side scripting attacks
Buffer over flow attacks

25
What is a Denial of Service?
* _Interruption_ that **floods** the **traffic of the network** that _prevent_ **legit users** from **accessing information** and **services** * _Blocks_ users from the **websites** they visit regularly: email, online accounts, online banking and other websites
26
What are the types of resources in by DOS attacks?
1. **Network bandwidth**: The speed + capacity of a network connection that is consumed 2. **System resource**: Aims to **crash** or **overload** the **handling software** 3. **Application resources**: _Involves_ a number of **valid requests** each _consumes_ **significant resources** and _limit the ability of the server_ to _respond_ to **requests for users**
27
Source Address Spoofing ## Footnote
* Uses **forged source addresses** * Makes _attacking systems harder_ to **identify** * Generates **large volumes of packets** that have the **target system** as the _destination address_ * **Congests the router** to _lower capacity_ of the **link** -\> * **Network engineers** need to _query_ the flow of information
28
What is SYN Spooling?
* Common DOS attack * Attacks the ability of the server to _damage_ the **future connection requests** * **Legit users _denied access_** to the **server**
29
What is Flooding Attack?
**Overloads **the _capacity_ of the **server** of: * ICMP flood * UDP (PORT number on target system) * TCP SYN
30
What are the broad categories of pay loads?
1. **Corruption** of the system or data 2. **Theft of service** to make the system a **zombie agent** of attack 3. **Theft of information **from the system 4. **Hiding **the presence of the system