Topic 3 - Software Flashcards

(55 cards)

1
Q

What are Vectors in Computer Security?

A

Vectors are the mechanism through which a malware infects a machine i.e. a software vulnerability or someone clicked a suspicious link, etc…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are payloads?

A

Payloads are the actual malware deposited on the machine, or the harmful results

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the formal definition of a virus?

A

A piece of self-replicating code, which propagates by attaching itself to a disk, file or document

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the formal definition of a worm?

A

Worms are self-replicating and stand-alone programs, which do not require human intervention. They exploit known software vulnerabilities in order to spread.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the ‘Exploit Lifecycle’?

A

Exploit lifecycle measures how long the exploit takes to cause problems. Example - Standard lifecycle involves the exploit being discovered by reverse-engineering a patch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a ‘Zero-Day’ exploit?

A

It is an exploit in the system that was previously unknown by the system developers - Substantially more dangerous than a standard exploit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Trojan?

A

A malicious program pretending to be a legitimate application
It is often obtained through email attachments or malicious websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does ransomware work?

A

Ransomware will encrypt or block access to files and demand a ransom. Due to this, if you attempt to remove it via an Anti-Virus, then your files will still remain inaccessible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a defining feature of Trojans?

A

Trojans cannot replicate themselves - They rely on human error to spread.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are some challenges faced when attempting to install ransomware on another machine?

A

Getting a user to run it
Bypassing the Anti-Virus and browser protections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are some of the common methods for deploying Ransomware?

A

Fake emails
Malicious web pages
Obfuscated Javascript attachments
Deployed using exploit kits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a formal definition of an Exploit?

A

A software or hardware bug that allows an attacker to circumvent an OS’s security perimeter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are some key areas that exploits target with Memory Management?

A

Buffer Overflow
Stack Overflow
Heap Overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does a Buffer Overflow occur?

A

Buffer overflows occur when data is written into a buffer. If the data is larger than the buffer and exceeds its size, then an overflow occurs, and then the data will overwrite the memory beyond the buffer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How is the Stack defined?

A

A stack holds information on local variables and function calls. A function call will push a new frame onto the stack, and a return will pop it off.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does Stack Smashing work?

A

Stack Smashing works by crafting a specific long string, and then, within C/C++ programs, causing the memory management to push over a buffer limit, thereby overriding data with custom exploit code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How does a Canary work?

A

Stack canaries modify the prologue and epilogue of all functions to check a value in front of the return address is unchanged.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How do modern systems defend against a memory overflow attack?

A

Modern systems include a feature called Data Execution Prevention (NX), which marks stacks as non-executable if they detect any issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are some further protection methods that are used?

A

Developers restrict access to obvious system calls
Address Space Layout Randomisation (ASLR) moves the address of library and programs around
Null bytes are inserted into standard library addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is Return-Oriented Programming?

A

It doesn’t insert exploit code, and instead pieces together other bits of code already on the machine and uses them to execute exploits instead.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the three types of Anti-Virus?

A

Signature-based detection
Heuristics
Machine Learning/Next-Gen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How does Signature-based detection work in Anti-Virus?

A

Stores some small code signature for each virus
Scan files either in bulk or at runtime, compare with the signatures on file
Uses generic signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How does Heuristic Detection work in Anti-Virus?

A

Heuristics determine what actions and rules a virus program will normally adopt
It starts the program in a VM, and sees what it does
Theoretically it can detect a virus that doesn’t strictly match some signatures

24
Q

What is an IDS and how does it work?

A

Intrusion Detection System:
Detects possible intrusion attempts, and generates alerts and logs for administrators

25
What is an IPS, and how does it work?
Intrusion Prevention System: Identical to IDS, except it also stops the attack
26
What are the two types of IDS deployment and how does each one work?
Host-based: Monitors a single host to find suspicious activity including resource/app usage Network-based: Monitors network traffic and analyses packets from different protocols to identify suspicious activity
27
How does Host-based IDS work on a finer scale?
It is an additional layer of security software running on a host within a protected LAN or VPN It creates a profile of usage for specific users It can monitor CPU, memory use, application use and the network stack.
28
How does Network-based IDS work on a finer scale?
It is placed at a viewpoint on a network to examine and analyse traffic i.e. installed on a firewall or behind a screened subnet May perform deeper analysis than many firewalls e.g. stateful protocol analysis and deep packet inspection
29
What are the general components of an IDS?
Sensors/Agents - Collect and collate data from multiple viewpoints on a network Analysers - Ascertain if an intrusion has taken place Reporting - Notify the administrators via alerts on a console or graphical interface
30
What are the three types of Detection Modes?
Signature-based - Fingerprinting sequences of operations or packets Anomaly-based - Build a 'model' and find deviations Stateful Protocol Analysis - More complex version of a stateful packet filter
31
How do Signature-based systems work?
Signatures are created and stored in a database They then compare network activity against the database and an alarm is triggered if there is a match It includes some form of attack language: Mechanisms to describe sequences of events, as well as maintaining and monitoring intermediate states and event transitions
32
What are some advantages of Signature-Based Systems?
Computationally efficient Always spots known attacks
33
What are some disadvantages of Signature-Based Systems?
Always misses unknown attacks Detailed signature databases must be kept up-to-date
34
What is an example signature in Signature-based systems that could flag an issue?
A machine is producing large amounts of ICMP traffic, establishing many TCP connections, and these connections are going to other hosts This example behaviour is indicative of Port Scanning
35
How does Anomaly Detection work?
Anomaly Detection builds up a picture of normal usage across the system, and then detects when something moves beyond what is normal
36
What is a primary disadvantage of Anomaly Detection?
There can be many false positives and false negatives, thereby skewing the results.
37
How does Anomaly Detection collect 'normal' usage data?
It runs a host within a quarantined environment and collects training data This data is constructed by monitoring audit logs It sometimes relies on analysis of sequences of system calls through normal behaviour
38
How is Machine Learning applied in an Anti-Virus context?
It trains a model to make predictions on the normal usage data, and aims to model more complex usage behaviours
39
What is an example of Machine Learning in an Anti-Virus context?
A network is pre-trained Sensor measurements are then passed through the network Activations in specific neurons then signal an alert to an intrusion
40
What are some drawbacks of using Neural Networks as Anti-Virus methods?
Scaling - Search space can increase exponentially, and have to use real-time data False negatives - Limits are in the representation, and what is normal behaviour can change, so do you re-train and risk learning intruder-type behaviour?
41
How does Stateful Protocol Analysis work?
Holds detailed session information on protocols being used, and examines them for attacks e.g. why is the user using root?
42
What are some defining properties of Stateful Protocol Analysis?
Computationally costly Requires the IDS have all possible versions of these protocols described in its database
43
How is Database Security defined in Computer Security?
A range of tools, controls and measures designed to establish and preserve database confidentiality, integrity and availability
44
What does Confidentiality, Integrity and Availability mean in the context of Database Security?
Confidentiality - Protection of sensitive data within a database Integrity - Data in a Database is accurate, complete, consistent and valid Availability - Data in a Database is readily available for use when needed
45
What does Integrity Protection mean in the context of Database Security?
Integrity protection aims to achieve data consistency within a database
46
What are the two different types of Integrity Protection in Database Security?
Internal Consistency - Database entries obey some pre-defined rules External Consistency - Database entries are correct
47
How does SQL Security work?
It implements access control based on three entities: - Users - Actions - Objects
48
Why use View-based Security?
Views are a flexible way of creating policies closer to application requirements Views can simplify complex queries and enhance data security by restricting direct access to tables Data can be easily reclassified
49
Why wouldn't you use View-based Security?
INSERT/UPDATE actions depend on the CHECK options, else they might be blind inserts Completeness and consistency are not achieved automatically Can quickly become very inefficient
50
What is a problem with Statistical Database Security?
When using statistical queries, you can infer some information from the data used.
51
What are some further methods for protecting data inference in Statistical Database Security?
Data Swapping - Swap records but keep stats the same Noise Addition - Alter aggregate output Table Splitting - Separate data completely User Tracking - Log Queries
52
How can a website/application be vulnerable to SQL Injection attacks?
If it doesn't filter SQL control characters, then it is vulnerable
53
What is the difference between an SQL Injection attack and a Blind SQL Injection attack?
A Blind SQL Injection attack won't receive any output response from the database - Performs database analysis completely blind
54
What is a Second Order SQL Injection attack?
Store the exploit for the system in one pass, then execute it in a later pass/command
55
What are some general methods to prevent SQL injection/Database attacks?
Sanitise user input Use Views Parameterise queries Store procedures Use established libraries Use Principle of least privilege