MODULE 5 Flashcards

1
Q

Malware:

A

A program that intends to compromise confidentiality, integrity, or availability system assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Backdoor (Trapdoor):

A

Secret entry point that bypasses security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Mobile code:

A

Programs that move between heterogeneous devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Auto-rooter kit:

A

Malware that generates virus codes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Crimeware:

A

Kits for building malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Rootkit:

A

Set of hidden programs that acquire administrative access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Zombie (Bot):

A

Software on internet attached computers that launch attacks on others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

APT stands for _____

A

Advanced Persistent Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

APT:

A

Sophisticated attacks over an extended period on selected targets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Classification of malware:

A
  • Needs host
  • Independent
  • Doesn’t replicate
  • Replicates
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Attack sources:

A
  • Politically motivated
  • Criminals
  • Organized crime
  • International consultancy organizations
  • National government agencies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

APT techniques:

A
  • Social engineering
  • Spear-phishing
  • Drive-by-downloads
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

APT’s intent:

A
  • Infect the target
  • Extend access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Phases of a typical virus:

A
  • Dormant (Idle)
  • Propagation (Copying)
  • Triggering (Activating)
  • Execution (Performing functions)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Mobile phone worms:

A

Worms that communicate via Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Threat mitigation options:

A
  • Detection
  • Identification
  • Removal
13
Q

Virus components:

A
  • Infection mechanism
  • Trigger
  • Payload
14
Q

Drive-by-download:

A

Exploiting browser vulnerabilities when a user visits a compromised website

14
Q

Water-hole attack:

A

Studying victim behavior to know what websites they use and then scanning said websites for vulnerabilities to compromise it

14
Q

Malvertising:

A

Paying for ads with malware in them on websites that the victim visits

15
Q

Clickjacking (UI redress attack):

A

Leading the user to believe that they’re typing their password to their bank account when instead, they’re typing it into an invisible frame

15
Q

Payload types:

A
  • Causing system corruption
  • Attack agent bots
  • Information theft
  • Rootkits and backdoors
16
Q

Klez payload:

A

Stops anti-virus programs

17
Q

Chernobyl payload:

A

Infects files when they’re opened

18
Ransomware payload:
Encrypts user data to demand payment in order to recover the data
19
Real-world damage payload:
Damages physical equipment
20
DDoS stands for _____
Distributed Denial of Service
21
Bot uses:
* DDoS * Spam * Advertisement * Manipulating polls * Spreading malware * Sniffing
22
Phishing identity theft:
Social engineering by masquerading as a trusted source
23
Spear phishing:
Acting as a trusted source for a specific target
24
Main elements of prevention:
* Policy * Awareness * Vulnerability mitigation * Threat mitigation
25
Requirements for effective malware countermeasures:
* Generality * Timeliness * Resiliency * Minimal DoS costs * Transparency * Global/local coverage
26
Antivirus software generations:
1. Simple scanners 2. Heuristic scanners 3. Activity traps 4. Full-featured protection
27
Host-based behavior-blocking software:
Software that integrates with the host to monitor program behavior for malicious actions