Malware Flashcards

1
Q

What is malware?

A

Any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user’s computer security and privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the phases of malware? (4)

A
  1. Dormant
  2. Spreading
  3. Triggering
  4. Attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the purpose of the dormant phase?

A

For the malware to remain undetected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of the spreading phase?

A

To infect other hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the purpose of the triggering phase?

A

Waiting for the commands or set of conditions to be satisfied in order to move from the dormant / spreading phase into the attack phase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the purpose of the spreading phase?

A

Where the virus performs the malicious activity that is was designed to do, referred
to as the payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a method used to determine if a host is vulnerable?

A

Port scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a backdoor?

A

a way to access a computer system that bypass the systems customary security
mechanisms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How to defend against insider attacks? (5)

A
  1. Avoid single points of failure - no one employee can
    be in charge of backups or manage critical systems
  2. Use archiving tools and version control
  3. Follow the principle of least privileges
  4. Physically secure critical systems (e.g. air gaps, critical servers in locked rooms with power failure backup)
  5. Control software installations to a reliable source
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a virus

A

a piece of malware that requires other programs in order to spread.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is a worm

A

a piece of malware that is able to spread independently

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is a zero day vulnerability

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the limitation of static analysis for assessing software code for malware?

A

It only useful against known vulnerabilities and signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

how should dynamic analysis be done?

A

by running the new software in a sandbox and analyse the characteristics of the
software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an asset?

A

anything that has value or can cause loss if compromised

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is a threat?

A

Any potential for occurrence of a violation of security

17
Q

what is a vulnerability?

A

A weakness (gap/bug, etc) that can be exploited by an attacker to perform its attack

18
Q

what is a risk?

A
19
Q

what is a threat agent?

A

is an entity that poses a threat, i.e., can carry out an attack

20
Q

examples of vulnerabilities (6)

A
  1. Buffer overflow
  2. Weak crypto-suite
  3. Flawed key management
  4. Weak password policy
  5. Hard-coded credentials
  6. Weak input-validation
21
Q
A