Viruses | Networking Flashcards

(27 cards)

1
Q

Trojans

A

generally hidden as a legitimate program that the user downloads/installs and
then transfers to the user computer
○ Attacker usually uses social engineering to fool the user into downloading/installing
○ Can spoof products by using the same icons and names
○ Not usually spread from a device once infected and remain on the host’s computer
○ Once it is installed, it performs malicious actions such as backdooring a computer,
spying on its user, and doing various types of damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Rootkits

A

a package giving the highest privileges in the system (think admin level control
down to the OS itself)
○ Software that allows for stealthy presence of unauthorized functionality in the
system
○ Used when the attackers need to backdoor a system and preserve unnoticed access as
long as possible.
○ May register system activity and alter typical behavior in any way desired by the
attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Companion Virus

A

poses as a legitimate file by copying its file name but uses a different
extension - it doesn’t modify files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Macro Virus

A

virus that’s written in macro, a programming language rooted inside
software applications like Microsoft Office
○ Uses the mini-basic programming language.
○ Macros are used for automation to increase workflow.
○ Operates by injecting its code into macros attached to the type of popular data files
associated with office work, like Microsoft Word, Excel, or PowerPoint files
○ Can deliver other malware to your system and also uses deception like a Trojan to
spread by hiding under seemingly legitimate files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Armored Virus

A

a type of malware designed to evade detection and hinder the analysis
process by using various techniques, such as encryption, obfuscation, or manipulation of
code.
○ These viruses are created to prevent antivirus software from detecting, diagnosing,
and removing them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Botnet

A

networks of computers infected by a botnet agent that are under hidden control of
a third party.
○ Used to execute various commands ordered by the attacker.
○ Called a group of zombies.
○ Common uses of botnets are criminal operations that require distributed resources,
such as DDoS attacks on selected targets, spam campaigns, and performing click
fraud.
○ From the moment of infection, botnet agents keep in touch with their remote
Command-and-Control server (C&C)
○ Most common implementation of the C&C is a web-application, contacted by the
client via simple HTTP requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Stealth Virus

A

any virus that attacks while trying to avoid detection by antivirus software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Polymorphic virus

A

mutate to change their code while usually retaining their core function.
Employ a polymorphic (mutation) engine to hide their code, usually through
cryptography.
○ The mutation engine modifies the malware’s decryption procedure every time it
replicates, making its new state challenging for conventional antivirus software to
identify.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Multipartite (aka hybrid) virus

A

a fast-moving virus that uses file infectors or boot infectors
to attack the boot sector and executable files simultaneously.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Ransomware

A

type of malware identified by specified data or systems being held captive by
attackers until a form of payment or ransom is provided.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Boot sector

A

The boot sector is a small section at the very beginning of a storage device (like a hard drive, SSD, or USB stick). It contains machine code that tells your computer how to start (boot up) the operating system.

When the boot sector is infected, simply turning on the computer will trigger a boot sector
virus because it latches on to the hard drive that contains the data that is needed to start the
computer.

💡 It’s the very first thing your computer reads when you power it on — even before Windows, macOS, or Linux loads.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Personal Area Network (PAN)

A

a network that is centered around a person and their devices
(like Bluetooth)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Local Area Network (LAN)

A

computers connected in a limited area, like home or office.
○ Most often Ethernet, Wi-Fi, or both (remember it can be wired or wireless)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Wireless Local Area Network (WLAN)

A

same as LAN but wireless – Wi-Fi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Storage Area Network (SAN)

A

network that allows access to storage devices specifically.
○ Allow servers to access devices such as disk arrays.
○ Presented to OS like any other storage device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Campus Area Network (CAN)

A

provides networking of multiple LANs across a limited area,
like a university campus, group of buildings owned by a company, etc.

17
Q

Metropolitan Area Network (MAN)

A

covers a whole city or the equivalent of a metropolitan
area.
○ Made up of multiple LANs owned by many entities.

18
Q

Wide Area Network (WAN)

A

covers a large geographical area within its network (like the
internet)
○ Used by international companies and governments (banks, for example)

19
Q

Simplex mode

Transmission mode

A

Sender can send the data, but the sender can’t receive the data. It is a type of
unidirectional communication in which communication happens in only one
direction. Example of this kind of mode is Keyboard, Traditional Monitors, etc.

20
Q

Half duplex mode

Transmission mode

A

Sender can send the data and also receive the data one at a time. It is a type of two-
way directional communication but restricted to only one at a time. An example of
this kind of transmission is the Walkie-Talkie, where the message is sent one at a
time but in both directions.

21
Q

Full-duplex mode

Transmission mode

A

Sender can send the data and also can receive the data simultaneously. It is two-way
directional communication simultaneously that is both way of communication
happens at a same time. Example of this kind of transmission is Telephone Network,
where communication happens simultaneously.

22
Q

Multiplexing

Transmission mode

A

Multiplexing, or muxing, is a way of sending multiple signals or streams of
information over a communications link at the same time in the form of a single,
complex signal. When the signal reaches its destination, a process called
demultiplexing, or demuxing, recovers the separate signals and outputs them to
individual lines.

23
Q

Client-server model

A

centralized network where one or more devices, or servers, provide
services and resources to other devices, or clients.
○ Clients request and receive data from servers which handle processing and storage.
○ More reliable, secure, and efficient than P2P
○ High cost, complex, and require maintenance.
○ Require specialized hardware and software and depend on the functionality and
available of the servers.
○ Suitable for large-scale, permanent, or formal applications, such as web hosting,
email, or database management

24
Q

Peer-to-peer (P2P)

A

each machine on the network can act as both server and client (like
Bitcoin and Tor)
○ Easy to setup – minimal hardware and software requirements
○ Users control their own data and resources.
○ Limited performance, reliability, and security
○ Suitable for small-scale, temporary, or informal applications (gaming, file sharing,
and messaging)

25
Requester
person or device that requests a network connection service.
26
Web server
software and hardware that uses HTTP and other protocols to respond to client requests made of the web.
27
Web server providers
Apache, Oracle, AWS (Amazon), Nginx, LiteSpeed, Microsoft-IIS, OpenResty, etc.