Malware Flashcards

(38 cards)

1
Q

What is the weakest link principle?

A

The weakest link in a security chain is responsible for failure of security systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is malware (malicious software)?

A

Any software design to cause harm to computer systems, networks, or users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What can malware do if it infiltrates a system?

A
  • Steal sensitive data
  • Disrupt system operations
  • Allow unauthorised access to device
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What types of malware are there?

A
  • Viruses
  • Worms
  • Trojans
  • Ransonware
  • Zombies
  • Bonets
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a virus?

A

A malicious executable code attached to another executable file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How can viruses be prevented?

A

Using antivirus and avoiding untrustworthy files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are worms?

A

Self replicating malware that doesn’t require a host to run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How do worms spread?

A

Copy themselves and send themselves to several devices across the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What allows worms to spread?

A

Network vulnerabilities, email attachments or malicious links

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do you prevent computer worms?

A

Regular updates and using a firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are Trojans?

A

Malware disguised as legitimate software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can Trojans be prevented?

A

Being cautious with emails and downloads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is ransomware?

A

Infects computer, encrypts files and locks system for a ransom

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How can ransomware be prevented?

A

backup files and avoid suspicious links

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a zombie?

A

A computer that has been compromised and controlled by hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How are zombies spread?

A

Can be spread by any malware i.e. trojans, worms

17
Q

How to prevent computer becoming a zombie?

A

Regular updates, monitor unusual activity, strong authentication firewalls

18
Q

What is a botnet?

A

A network of zombies controlled remotely

19
Q

What is the impact of zombies?

A

Can send spam emails, steal sensitive data or launch DDoS attacks

20
Q

What is a DDoS attack?

A

A hacker makes a website or other services inaccessible by flooding it with requests from many different devices

21
Q

How do malware gain access?

A
  • phishing emails
  • Exploiting weak systems
  • Manipulating victims
  • Fake websites or ads
  • Hidden within software
22
Q

What are the effects of malware?

A
  • Data theft
  • System damage
  • Loss of privacy
  • Financial loss
  • performance issues
  • Reputation damage to organisations
23
Q

Other than malware, what other methods are used to gain personal information?

A
  • Phishing
  • Social engineering
  • Grooming
  • Deepfakes
  • Online stalking
24
Q

What is phishing?

A

Spam emails containing malicious hyperlinks that convince victims to give personal information

25
What is social engineering?
'hacking without code': perpetrator gains trust of victim by collecting data on them and convincing them to share personal information
26
How can social engineers find data on victims?
- Dumpster diving for documents that haven't been shredded - Motoring social media - Spying on someones screen in public
27
What is grooming?
Gaining trust of someone over time by being nice to them, then asking the victim to reveal information about themselves
28
What is threat modelling?
A technique within the security lifecycle to analyse a system's security and privacy
29
What are the 5 key phases of threat modelling?
- Asset identification - Threat analysis - Vulnerability analysis - Risk Assessment - Risk communication
30
What is asset identification?
Determining what you're trying to protect
31
What is threat analysis?
Identifying potential attacks that could compromise the assets
32
What is vulnerability assets?
Pinpoint weaknesses in the setup - technical and organisational
33
What is Risk assessment?
Evaluate the likelihood and impact of threats
34
What is risk communication?
Share findings with stakeholders
35
What are non-intentional threat agents?
things/individuals that cause natural or accidental damage
36
What are malicious threat agents?
An individual or group that implements a threat with malicious intent
37
38
What is DREAD?
A risk assessment model that evaluates threats based on five criteria