module 21 Flashcards
What refers to a set of policies that make mobile and workstation computers and network appliances more secure?
hardening
Some options for hardening mobile devices, configuring a screen lock out and encrypting data for instance, were discussed earlier. Some other typical hardening policies are as follows: (there are six)
- anti-virus/anti-malware
- patching/updates
- enabling passwords
- default/weak passwords
- disabling unused features
- removing unwanted/unnecessary software
What do you call software that aims to damage a computer or steal information from it?
malware
This type of hardening option detects the presence of malware and prevent it from running.
What is it?
anti-malware
What is an interchangeable name for anit-malware?
anti-virus
__________ __________ means the range of things that an attacker could possibly exploit in order to compromise the device.
attack surface
New computers ship with a large amount of pre-installed software, often referred to as __________.
bloatware
OS files, driver software, and firmware may be exploitable by malware in the same way as applications software. Besides anti-malware, what else needs to be done?
I need to install the latest updates/patches
Computer viruses are programs designed to replicate and spread amongst computers. Viruses are classified by the different ways they can infect the computer. Give three examples:
- program viruses
- macro viruses
- worms
Of the three types of viruses, which is being described below?
These viruses affect Microsoft Office documents exploiting the macro programming language Visual Basic for Applications (VBA) used to automate tasks.
macro viruses
what does VBA stand for?
Visual Basics Applications
Of the three types of viruses, which is being described below?
These are sequences of code that insert themselves into another executable program or script. When the application is executed, the virus code becomes active.
program viruses
Of the three types of viruses, which is being described below?
Memory-resident viruses that replicate over network resources, such as email, by exploiting faults in software programs.
worms
Name four things that a viruses “payload” might be programmed to do.
- display silly messages
- corrupt or delete documents
- damage system files
- install some sort of spyware to snoop on the user
What term refers to the act of impersonation or disguising the true source of information.
spoofing
Most viruses must be activated by the __________ and thus need some means to trick the user into opening the infected file.
user
Jim’s computer is infected with a virus and has Alan’s email address in his address book. When Sue gets an infected email apparently sent by Alan, it is the virus on Jim’s computer that has sent the message.
What is this an example of?
spoofing
Viruses can also use application exploits to replicate without user intervention, in some circumstances. The most common scenario is for the malware to be uploaded to a compromised website and to try to trigger exploits in the clients visiting the site via vulnerabilities in the OS, the web browser, or web browser plug-in.
What is this referred to as?
drive-by-download
Other types of malware are not classed as viruses as they do not necessarily try to make copies of themselves. They represent an even greater security threat than viruses however.
What are they called?
Trojan Horse or Trojan
A web pop-up claims to have detected viruses on the computer and prompts the user to initiate a full scan which installs the attacker’s Trojan.
What is this called?
scareware
What’s an interchangeable term for scareware?
rogueware
Many Trojans function as __________ applications.
backdoor
What do you call a program that monitors user activity and sends the information to someone else?
spyware
Type of malware that tries to extort money from the victim.
Ransomware