Spam Flashcards

(26 cards)

1
Q

What is email spam according to the Text Retrieval Conference?

A

Unsolicited, unwanted email sent indiscriminately by a sender with no current relationship with the recipient.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the prevalence of spam in internet emails?

A

90% of internet emails are spam. Akismet blocks 60 billion spams annually.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which countries are major sources of spam, and what are their percentages?

A

India (12.19%), USA (7.06%), Italy (6.95%).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How are email addresses obtained for spam?

A

Harvested from websites, sold as lists, or obtained via malicious QR code links.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Web2.0 spam (Spam2.0)?

A

Junk posts, ads on blogs, malicious wiki edits, incorrect tags in documents/bookmarks to redirect traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What was the first spam-fighting software, and how did spammers adapt?

A

CancelBot was the first. By 1997, spammers obfuscated spam to evade primitive filters, some of which were commercial.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How do Realtime Blacklists (RBLs) work to combat spam?

A

Use DNS lookups to check an email’s originating IP against a list of spammer networks, blocking traffic from identified sources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the disadvantages of using RBLs?

A

Reactive, doesn’t stop initial spam floods; IPs change due to company takeovers; innocent IPs get listed due to malware. Use with SpamAssassin, not alone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the ideal characteristics of malware from an author’s perspective?

A

Hard to detect, not easily removed, spreads widely, reinfects programs, easy to create, machine/OS independent, often one-time execution (e.g., email opening).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe the limousine reservation company hack and its impact.

A

Hackers exploited a ColdFusion vulnerability, exposing personal/financial data of 850,000 customers, including CEOs/celebrities’ credit card numbers, names, addresses, and travel plans.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the common delivery methods for malware?

A

Emails/documents with code, files, boot sectors, peer-to-peer sharing, remote exploitation of vulnerabilities, multiple methods combined.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why is preventing viruses challenging with modern file types?

A

Executables hide in documents (e.g., .doc, spreadsheets) via embedded code. File type is hidden in a field, exploitable despite incorrect suffixes. Even read-only documents/pictures can conceal code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How do air-gapped systems like SACCS enhance security?

A

Physically separated from the internet (no IP address). SACCS uses old computers, now with solid-state storage instead of floppies, maintained by specialists to ensure reliability/security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are safe electronic contact procedures to prevent malware?

A

Use trusted software, test on isolated systems/VMs with updated scanners, open only known safe attachments, avoid peculiar messages, maintain recoverable system images, back up executables, use updated virus detectors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are key information security standards mentioned?

A

NCSC’s Rainbow Books (e.g., Orange Book/TCSEC, C2 as de facto commercial standard), Common Criteria (2005, replaced TCSEC), ISO17799:2005 (code of practice). NCSC rates products for certification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the difference between discretionary and mandatory access control?

A

Discretionary: User-controlled credentials (e.g., ID/password). Mandatory: System-controlled credentials (e.g., IP/MAC address).

17
Q

How does discretionary access control (DAC) function?

A

Users with rights to an object can extend those rights to others. Subdirectories inherit rights. System enforces compliance (e.g., minimum 6-character passwords). C2 offers finer control than C1.

18
Q

What are the C2 requirements for a trusted system?

A

Security policy, accountability, assurance, documentation. Ensures fine-grained DAC, individual accountability via login, resource isolation, and auditing.

19
Q

What is the C2 security policy requirement?

A

Explicit policy enforces access rules for subjects/objects. Mandatory controls restrict sensitive data; discretionary controls limit access to selected users. TCB controls access and prevents unauthorized restoration.

20
Q

What is the Trusted Computing Base (TCB)?

A

All protection mechanisms (hardware, software, firmware) in a system, ensuring integrity for processing sensitive information. Predictable behavior builds trust; a breach in one TCB can compromise networked systems.

21
Q

What are the reference monitor and security kernel in a trusted system?

A

Reference monitor mediates object relationships, enforcing DAC. Security kernel (hardware/software) implements it, mediating all accesses, protecting itself from tampering.

22
Q

What is the “need to know” principle in security?

A

Access to objects (e.g., files) is granted only if the requester has a legitimate need. Systems enforce controls to prevent circumvention.

23
Q

How does C2 discretionary access control ensure security?

A

TCB controls access between named users/objects using mechanisms like access control lists, limiting sharing to authorized individuals/groups, with single-user granularity.

24
Q

Why is object reuse prevention critical in C2 systems?

A

Prevents unauthorized restoration of deleted files or data, ensuring no residual data can be accessed by malicious users.

25
How does accountability work in C2 systems?
Tracks security-relevant actions via protected audit logs, associating user identities with auditable actions. Logs are protected from modification and analyzed for security events.
26
What are the sub-criteria for accountability in C2 systems?
Identification, authentication, audit. TCB requires protected user identification (e.g., passwords) before actions, associating all auditable actions with individual users.