Lecture 3a Flashcards

(39 cards)

1
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is malware?

A

Software that enters a computer system without the user’s knowledge or consent and performs unwanted harmful actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the five primary actions malware performs?

A

Imprison Launch Snoop Deceive Evade

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does ransomware do?

A

Prevents a user’s endpoint device from functioning properly until a fee is paid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is crypto-malware?

A

Malware that imprisons users by encrypting all files on the device making them inaccessible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does crypto-malware increase the cost of unlocking?

A

The cost of the key increases every few hours or days

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the two main types of viruses?

A

File-based virus and fileless virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a file-based virus?

A

Malicious code attached to a file that reproduces itself on the same computer without human intervention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an armoured file-based virus?

A

A virus that uses techniques like split infection and mutation to avoid detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a fileless virus?

A

Virus that does not attach to files but loads code into computer memory to avoid detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

List advantages of fileless viruses over file-based viruses.

A

Easy to infect Extensive control Persistent Difficult to detect Difficult to defend against

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a worm?

A

A malicious program that uses a computer network to replicate exploiting vulnerabilities in applications or OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What harmful actions can worms perform?

A

Deleting files Allowing remote control by attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a bot in malware terms?

A

An infected computer under remote control used to launch attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a botnet?

A

A network of infected bot computers controlled by a bot herder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are two common types of snooping malware?

A

Spyware and keyloggers

17
Q

What does spyware do?

A

Tracking software deployed without user’s consent or control

18
Q

What is a keylogger?

A

Software or hardware that silently captures and stores each keystroke typed on a keyboard

19
Q

What is a Potentially Unwanted Program (PUP)?

A

Software the user does not want that may include intrusive advertising or hijacking browser settings

20
Q

What is a Trojan?

A

An executable program that appears benign but performs malicious actions

21
Q

What is a Remote Access Trojan (RAT)?

A

A Trojan that gives unauthorized remote access to the victim’s computer using special communication protocols

22
Q

What is a backdoor in malware?

A

Malware that gives access circumventing normal security protections

23
Q

What is a logic bomb?

A

Malware code that lies dormant and activates when a specific logical event triggers it

24
Q

What is a rootkit?

A

Malware that hides its presence and other malware by accessing lower layers of the operating system

25
What is cross-site scripting (XSS)?
An attack where malicious scripts are injected into trusted websites to be run in another user's browser
26
What is an injection attack?
An attack that inserts malicious input to exploit vulnerabilities in applications usually targeting databases
27
What does SQL injection target?
SQL servers by introducing malicious commands through crafted statements
28
What is cross-site request forgery (CSRF)?
An attack that tricks an authenticated user into executing unwanted actions on a web application
29
What is server-side request forgery (SSRF)?
An attack exploiting a web server's ability to process external URLs to gain sensitive information or inject harmful data
30
What is a replay attack?
An attack that intercepts and retransmits data to impersonate a legitimate user
31
What is a buffer overflow attack?
When a process stores data beyond the boundary of a fixed-length buffer causing adjacent memory to be overwritten
32
What is an integer overflow attack?
An attack that changes a variable's value outside its intended range causing unexpected behavior
33
What causes improper exception handling attacks?
Poor coding such as not validating user input or NULL pointer dereference causing crashes or vulnerabilities
34
What external software components can be attacked?
Application program interfaces APIs Device drivers Dynamic-link libraries DLLs
35
What is artificial intelligence (AI)?
Technology that imitates human abilities
36
What is machine learning (ML)?
A subset of AI where technology learns by itself through experience without continual programming
37
How is AI used in cybersecurity?
To detect predict and respond to cyber threats in real time including blocking phishing attacks
38
What are adversarial AI risks?
Security of ML algorithms being compromised and tainted training data producing false negatives
39
What does the word endpoint refer to in cybersecurity?
Network connected hardware devices