Technical Security Controls Flashcards
Technical Security Controls
- Malware:
- Malware refers to malicious software designed to disrupt or damage computer systems.
- Types of malware include viruses, worms, Trojans, ransomware, spyware, and adware.
- Malware can cause various problems such as data loss, system instability, unauthorized access, and financial loss.
- Technical Control Measures:
- Antivirus Software: Install and regularly update antivirus software to detect and remove malware.
- Firewalls: Implement firewalls to monitor and control network traffic, preventing unauthorized access and blocking malicious activity.
- Intrusion Detection and Prevention Systems (IDS/IPS): Deploy IDS/IPS to detect and prevent unauthorized access and suspicious network activity.
- Patch Management: Keep software and operating systems up to date with the latest security patches to address known vulnerabilities.
- Secure Configurations: Configure systems, applications, and network devices securely, following best practices and guidelines.
Access Controls: Implement strong user authentication mechanisms, such as passwords, multi-factor authentication, and access privileges.
- Encryption: Use encryption techniques to protect sensitive data both at rest and during transmission.
- Backup and Recovery: Regularly back up critical data and establish a disaster recovery plan to ensure business continuity.
- Limitations and Layered Approach:
- Technical controls are not fool proof and can have limitations due to misconfiguration, lack of understanding, or misuse by users.
- To enhance security, multiple layers of technical controls should be implemented.
- Layered security involves combining different controls to create overlapping defence mechanisms, increasing the overall effectiveness of security measures.
- By utilizing a combination of controls, organizations can mitigate risks and provide a more robust security posture.
Virus
- Definition of a Virus:
- A virus is a piece of software code that attaches itself to executable programs.
- It carries a malicious payload and replicates when the infected program executes in memory.
- Virus Behaviour:
- Viruses replicate by attaching copies of themselves to other executable programs in memory.
- They rely on the execution of their host program to activate and spread.
- Viruses do not cause damage or replicate while sitting dormant on a hard disk.
- Spread and Replication:
- Viruses only replicate or spread on the machine where their host program resides.
- They do not spread automatically to other machines unless consciously transferred or shared through means like USB sticks or file sharing.
- Types of Viruses:
- File Infectors: These viruses infect executable files, modifying their code to include the virus.
- Boot Sector Viruses: These viruses infect the boot sector of a computer’s hard drive or other storage media.
- Macro Viruses: These viruses infect documents or files that support macro functionality, such as Microsoft Office files.
- Script Viruses: These viruses exploit scripting languages to infect and propagate through scripts, such as JavaScript or VBScript.
Note: Understanding the behaviour and characteristics of different types of viruses is essential for implementing effective countermeasures and mitigating their impact.
What is a virus?
A) A piece of software code that attaches itself to executable programs
B) A hardware component that stores data
C) A type of firewall used to protect networks
D) A physical disease that affects computers
A) A piece of software code that attaches itself to executable programs
A virus is a type of malicious software (malware) that infects executable programs by attaching its code to them. When an infected program is executed, the virus activates and can perform various malicious actions, such as replicating itself, altering or corrupting data, or causing damage to the system. Viruses rely on the execution of the host program to spread and carry out their intended actions. They do not function independently and require a host program to execute their code. This characteristic distinguishes viruses from other types of malware like worms or Trojans, which can operate on their own without needing a host program.
Which type of virus infects executable files by modifying their code?
A) File infector virus
B) Boot sector virus
C) Macro virus
D) Script virus
A) File infector virus
File infector viruses are a type of virus that infects executable files by modifying their code. When an infected program is executed, the virus replicates itself and attaches to other executable files, spreading the infection.
What triggers the activation and spread of a virus?
A) Dormant state on a hard disk
B) Replication through email attachments
C) Execution of its host program
D) Automatic propagation to other machines
C) Execution of its host program
The activation and spread of a virus are triggered when its host program is executed. The virus requires the host program to execute in order to function and replicate itself. Without the execution of the host program, the virus remains dormant and does not cause any damage or spread to other files or systems.
Which type of virus infects documents or files supporting macro functionality?
A) File infector virus
B) Boot sector virus
C) Macro virus
D) Script virus
C) Macro virus
Macro viruses are specifically designed to infect documents or files that support macro functionality, such as Word documents or Excel spreadsheets. They exploit the macro programming language to execute malicious code and spread the infection to other documents or files that are accessed or opened with macro support enabled.
Worms
- Characteristics of Worms:
- Worms are self-replicating malicious software that spread over a network without human intervention.
- Unlike viruses, worms do not require a host program to execute and can move independently across the network.
- Worm Propagation:
- Worms typically exploit vulnerabilities in computer systems or network protocols to gain unauthorized access.
- Once a worm infects a system, it scans the network for vulnerable devices or uses email addresses to spread copies of itself.
- Worms can rapidly spread and infect numerous systems, causing network congestion and performance degradation.
- Impact of Worms:
- Worms can consume significant network bandwidth as they propagate, leading to network slowdowns or even outages.
- They can also compromise the security and confidentiality of sensitive data stored on infected systems.
- Worms often have a payload that can cause further damage, such as installing backdoors, stealing information, or launching DDoS attacks.
- Containment and Prevention:
- Detecting and containing worms can be challenging since they can spread quickly before detection.
- Implementing strong network security measures, such as firewalls, intrusion detection systems (IDS), and antivirus software, can help prevent worm infections.
- Regularly patching and updating software and systems can address vulnerabilities and reduce the risk of worm attacks.
- Incident Response and Recovery:
- In the event of a worm outbreak, organizations should have an incident response plan in place to contain and mitigate the impact.
- Isolating infected systems, disconnecting from the network, and deploying patches and antivirus updates are crucial steps.
- After containing the worm, organizations should conduct a thorough analysis to understand the root cause and implement measures to prevent similar incidents in the future.
What is a worm?
A. A self-replicating program that spreads over a network without human intervention.
B. A type of computer virus that attaches itself to executable programs.
C. Malicious code that modifies the boot sector of a computer’s hard disk.
D. A program that automatically executes a sequence of commands or actions.
A) A self-replicating program that spreads over a network without human intervention.
A worm is a specific type of malware that is capable of independently spreading and replicating over a network without any human interaction. Unlike viruses, which require user actions or the execution of a host program, worms can move from one system to another automatically, infecting multiple computers along the way. This characteristic makes worms particularly dangerous and challenging to contain once they are unleashed on a network.
What is a characteristic feature of worms?
A. They require human intervention to spread.
B. They attach themselves to executable programs.
C. They replicate independently over a network.
D. They can only infect email attachments.
C. They replicate independently over a network.
Unlike viruses that require human intervention or the execution of a host program, worms have the ability to spread and replicate over a network without any human interaction. This characteristic sets them apart from other types of malware.
How do worms differ from viruses?
A. Worms spread over a network without human intervention.
B. Worms require a host program to execute and replicate.
C. Worms can only infect files in the boot sector.
D. Worms can only spread through email attachments.
A. Worms spread over a network without human intervention.
While viruses typically rely on user actions or the execution of a host program, worms can self-propagate and spread autonomously over a network, infecting multiple systems in a short amount of time.
What is a common impact of worm infections?
A. Slow network performance and congestion.
B. Corruption of data stored on infected systems.
C. Execution of malicious code on the host program.
D. Physical damage to computer hardware.
A. Slow network performance and congestion.
Worm infections can lead to significant network congestion and reduced performance due to the rapid replication and distribution of the worm across multiple systems. The sheer volume of network traffic generated by worm propagation can overwhelm network infrastructure and cause disruptions. While other options may also occur in some cases, network performance issues are a common and prominent consequence of worm infections.
Rootkits & Logic Bombs
Rootkits:
- A rootkit is malicious code that embeds itself into the core part of an operating system, such as the system kernel.
- It gets its name from the fact that it resides at the “root” or core of the system.
- Unlike viruses, rootkits do not replicate themselves.
- Rootkits often have functions like intercepting system calls, modifying them, or capturing keystrokes.
- Detecting rootkits can be extremely challenging due to their ability to evade traditional security measures.
- Once a rootkit is discovered, the recommended method of removal is a complete system rebuild from trusted sources.
Logic Bombs:
- A logic bomb is a malicious program that remains dormant until specific conditions or circumstances are met.
- Typically, logic bombs are time-based, set to activate at a certain time or date, such as an anniversary.
- The purpose of a logic bomb is to execute a destructive payload when triggered, often resulting in data loss or system damage.
- Logic bombs do not possess replication capabilities like viruses.
- Identifying a logic bomb can be difficult since it is often designed to blend in with legitimate system processes.
- Mitigating the impact of a logic bomb requires proactive measures, such as robust system monitoring and access controls.
What is the primary characteristic of a rootkit?
A) It replicates itself across multiple systems
B) It inserts itself into the core part of the operating system
C) It triggers destructive actions at a specific time
D) It intercepts network traffic and captures sensitive data
B) It inserts itself into the core part of the operating system
A rootkit is malicious code that embeds itself into the core part of an operating system, typically the system kernel.
How do rootkits differ from viruses?
A) Rootkits replicate themselves, while viruses do not
B) viruses attach themselves to executable files, while Rootkits target the system kernel
C) Rootkits can be easily detected by antivirus software, while viruses are difficult to detect
D) Rootkits are spread through email attachments, while viruses spread through network vulnerabilities
B) viruses attach themselves to executable files, while Rootkits target the system kernel
Rootkits embed themselves into the core part of the operating system, while viruses typically attach themselves to executable files.
What distinguishes a logic bomb from a virus or a rootkit?
A) Logic bombs can replicate themselves, while viruses and rootkits cannot
B) Logic bombs remain dormant until specific conditions are met, while viruses and rootkits are always active
C) Logic bombs intercept system calls and modify them, while viruses and rootkits capture keystrokes
D) Logic bombs require human intervention to spread, while viruses and rootkits spread automatically
B) Logic bombs remain dormant until specific conditions are met, while viruses and rootkits are always active
A logic bomb is a malicious program that remains inactive until specific circumstances or conditions occur, triggering its execution. In contrast, viruses and rootkits are active and can propagate without specific triggers.
What is a logic bomb?
A) Malicious code that replicates itself across multiple systems
B) Malware that inserts itself into the core part of the operating system
C) A program that remains dormant until specific conditions are met, then executes destructive actions
D) Malicious software that intercepts system calls and modifies them
C) A program that remains dormant until specific conditions are met, then executes destructive actions
A logic bomb is a type of malicious program that is designed to remain inactive until certain conditions are met, such as a specific date or event. Once those conditions are fulfilled, the logic bomb activates and executes its destructive payload, which can involve actions like deleting files or formatting disks.
What is a rootkit?
A) Malware that spreads through network connections
B) Malicious software that intercepts system calls and modifies them
C) A program that remains dormant until specific conditions are met, then executes destructive actions
D) Malicious code that inserts itself into the core part of the operating system
D) Malicious code that inserts itself into the core part of the operating system
A rootkit is a type of malicious code that infiltrates the core components of an operating system, typically the system kernel. It operates at a privileged level and can intercept system calls, modify their behaviour, and evade detection by security measures. Rootkits are designed to give unauthorized control and access to an attacker while remaining hidden from normal system operations and security mechanisms.
Code Injections
- Code injection is a technique used to insert malicious code into a program to exploit vulnerabilities and achieve unauthorized actions or undesired outcomes.
- It occurs due to poor programming practices that allow the program to accept and execute code without proper validation.
- If all programs implemented robust input validation measures, code injection vulnerabilities would be mitigated.
- Code injection is one of the most prevalent software flaws and has remained a significant threat for many years.
- Various forms of code injection exist, such as SQL injection, OS command injection, and cross-site scripting (XSS).
- SQL injection involves manipulating SQL queries to gain unauthorized access or retrieve sensitive information from a database.
- OS command injection occurs when an attacker injects malicious commands to execute arbitrary system commands on the underlying operating system.
- XSS, or cross-site scripting, allows attackers to inject malicious scripts into web pages viewed by other users, leading to session hijacking or theft of sensitive information.
- Code injection attacks can result in serious consequences, including data breaches, unauthorized access, data manipulation, system compromise, and even remote code execution.
- Preventing code injection requires implementing secure coding practices, such as input validation, parameterized queries, and output encoding.
- Regular software updates and patching can help address known vulnerabilities and reduce the risk of code injection attacks.
- Web application firewalls (WAFs) and security testing, such as vulnerability scanning and penetration testing, can also aid in detecting and mitigating code injection vulnerabilities.
What is the primary cause of code injection vulnerabilities?
A) Weak network security measures
B) Insufficient hardware resources
C) Poor programming practices
D) Outdated antivirus software
C) Poor programming practices
Code injection vulnerabilities primarily occur due to poor programming practices that allow programs to accept and execute code without proper validation. This allows attackers to inject and execute malicious code, leading to unauthorized actions or undesired outcomes.
Which of the following is an example of code injection?
A) Denial of Service (DoS) attack
B) Cross-Site Scripting (XSS)
C) Man-in-the-Middle (MitM) attack
D) Social engineering attack
B) Cross-Site Scripting (XSS)
Cross-Site Scripting (XSS) is an example of code injection. It involves injecting malicious scripts into web pages viewed by other users. By doing so, attackers can manipulate the functionality of the web page and potentially steal sensitive information or perform unauthorized actions on behalf of the user.
How can code injection attacks be mitigated?
A) Implementing robust input validation
B) Increasing network bandwidth
C) Disabling firewalls
D) Ignoring software updates
A) Implementing robust input validation
Code injection attacks can be mitigated by implementing robust input validation practices. This involves validating and sanitizing all user input to ensure it meets the expected format and does not contain any malicious code. By properly validating input, the risk of code injection vulnerabilities can be significantly reduced. The other options, such as increasing network bandwidth, disabling firewalls, or ignoring software updates, are not effective measures for mitigating code injection attacks.
Adware and Spyware
- Adware refers to unwanted software that displays advertisements on a user’s device. It typically manifests as pop-up ads, banners, or other forms of intrusive advertising.
- Adware is designed to generate revenue for the developers by promoting products or services, often through deceptive or aggressive means.
- Adware can be annoying and disrupt the user experience, but it is generally not as malicious as other forms of malware.
- Spyware, on the other hand, is a type of malware that secretly collects user information without their consent or knowledge.
- Spyware is often installed without the user’s consent through deceptive methods such as bundled software, malicious downloads, or phishing emails.
- The purpose of spyware is to gather sensitive information like passwords, financial data, browsing habits, and personal details, which can be exploited for various malicious purposes.
- Spyware can also lead to identity theft, unauthorized access to accounts, and financial losses.
- Both adware and spyware can be distributed through malicious websites, free software downloads, or infected email attachments.
- To protect against adware and spyware:
- Use reputable antivirus and anti-malware software and keep them updated.
- Exercise caution when downloading software from unfamiliar sources.
- Be wary of clicking on suspicious ads or pop-ups and avoid visiting questionable websites.
- Regularly update your operating system and applications to patch security vulnerabilities.
- Enable firewalls and utilize pop-up blockers to reduce exposure to adware.
- Practice safe browsing habits and be cautious of email attachments, especially from unknown senders.
- If you suspect adware or spyware infection:
- Run a full system scan using antivirus or anti-malware software.
- Remove any detected threats and follow the software’s instructions.
- Monitor your accounts for any suspicious activity and consider changing passwords.
- If necessary, seek professional help to mitigate the impact and ensure the security of your system and personal information.
Which of the following best describes adware?
A) Malicious software that secretly collects user information
B) Unwanted software that displays intrusive advertisements
C) Software that encrypts files and demands a ransom for their release
D) Software that exploits vulnerabilities to gain unauthorized access
B) Unwanted software that displays intrusive advertisements
Adware refers to unwanted software that displays intrusive advertisements on a user’s device. It is designed to generate revenue for the developers by promoting products or services through aggressive or deceptive means. While adware can be annoying, it is generally not as malicious as software that secretly collects user information or exploits vulnerabilities.
How is spyware typically installed on a user’s device?
A) Through deceptive methods such as bundled software or malicious downloads
B) Via phishing emails that trick users into clicking on malicious links
C) By exploiting vulnerabilities in the device’s operating system
D) Through physical access to the device by an attacker
A) Through deceptive methods such as bundled software or malicious downloads
Spyware is typically installed on a user’s device through deceptive methods such as bundled software or malicious downloads. It may be included in software packages or downloads without the user’s knowledge or consent. It is important to exercise caution when downloading software from unfamiliar sources to avoid inadvertently installing spyware