Part 7, Dangerous data / data on your computer Flashcards
these can be configured within disk optimization on windows
where can
TRIM setting
be configured on windows
this part of the accronym stands for
integrity
from a security perspective this means that data should remain unchanged unless intended people are editing it
describe the
I
of the acronym CIA
this is some danger that can exploit a vulnerability
describe what a
threat
is
what will be inside a flash memory cell if it is interpreted as the following
1. read as 1
2. read as 0
within a flash memory cell what will each of these charges be interpreted as
1. filled with electrons (negative charge)
2. filled with no electrons
what is a
live system image
this is the process of taking an image of ram while it is running
what are some settings a
registry hive
may hold
some settings these might hold are:
- Desktop settings
- Printers
- Network settings
- Environmental settings
describe what a
zero day
is
this is a vulnerability that is unknown to software developers and security companies.
notes
- These types of vulnerabilities are sold on the black market and when used are known as a zero day attack.
- The purchase price for one of these can be worth hundreds of thousands when speaking about a major OS or browser
- On average when one of these becomes known to the the developers it can take on average 300 days to fix the vulnerability
to produce a hash from a given input this will use a combination of:
- constants
- AND, OR, NOT logic operators
- modulus operator with large prime numbers to produce smaller numbers from large numbers
what will a
hash algorithm
use in order to produce a hash from a given input
this is the heart of the virus and contains the viruses destructive code such as corrupting or collecting data or creating back doors
describe the
payload
of a virus
how does a
peer-to-peer botnet
maintain resillience
this maintains resillience by having each zombie only knowing the address of a few other zombies
destroying a commander or server does not cripple the entire botnet since only the botnets in its address range will be affected and any other zombie can pick up the role of the disabled commander or server
what
data might you typically find in ram
held in here you may find
- Instructions and data that will be needed by the processor
- The operating system
- Information about running programs and processes
- Networks a computer is connected to
- Decrypted passwords and files as well as the keys that decrypted them
- Registry hives
give two examples of a
vulnerability
some examples of this include
- allowing employees to insert any usb into network attached computers
- having out of date operating system or antivirus
give two examples of a
threat
some examples of this are
- zero-day attacks
- employees wishing to cause harm
name two technical factors that
malware
could use to gain entry to a computer
technical factors that this could exploit to gain entry to a computer could be
- using known weaknesses (exploits) in either software or hardware
- using a zero-day
with this the malware will rewrite its own code without effecting its functionality. therefore the data created will have a new signature
what is
metamorphic malware
to fully acheive this
- encryption should be used when data is being sent from client to server
- hashing should be used to store all data.
- Further encryption may be used to hide the hash
when
protecting passwords
describe where the following should be used
- encryption
- hashing
this is One way SSDs mitigate wear and involves not repeatedly using the same area of the drive but instead spread out new writes across the drive
what is
wear levelling
this accronym stands for
1. confidentiality
2. integrity
3. availability
what does the accronym
CIA
stand for
this is a software or an option within software that can ensure that a disk image is read only. Ensuring that the disk image remains unchanged even if it is mounted and navigated
what is a
write blocker
these are mainly concerned with spreading itself across networks. and may lie dormant until a command is received to do something
how do
botnets
operate
this type of attack involves iterating over a dictionary to see if you can get a password match
describe what a
dictionary attack
is
describe
adware
Forces users to view advertising and may report their internet use to advertisers or its creators.
what are
heuristics
used by antivirus programmes
these are rules used to identify malware and relies on using previous knowledge about how malware operates
what is a
write blocker
this is a software or an option within software that can ensure that a disk image is read only. Ensuring that the disk image remains unchanged even if it is mounted and navigated