Week 1 - Malicious Software Flashcards

1
Q

What does the acronym CIA stand for (not government)

[as in CIA triad]

A

C - Confidentiality
I - Integrity
A - Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does the CIA triad refer to?

A

it’s a guiding model for designing information security policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does confidentiality mean?

A

Keeping things hidden (from unwanted eyes)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does integrity mean?

A

Keeping data accurate and untampered with

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does availability mean?

A

The people who should have access to data, is readily accessible to them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How do you define risk?

A

The possibility of suffering a loss in an attack (on the system/device)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How do you define vulnerability?

A

A flaw in the system that’s exploited to compromise it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a 0-day/zero-day vulnerability?

A

A vulnerability that’s new/missed to a developer/vendor, but already discovered and exploited by an attacker

(the developer has had 0 days to fix it because it’s new to them)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an exploit?

A

software used by an attacker to target a specific vulnerability

[they write an exploit code]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do you define a threat?

A

possible attackers (burglars)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a hacker?

A

Someone who tries to break into and exploit a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the 2 common types of hackers?

A
  1. Black Hat
  2. White Hat
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What’s the difference between white hat and black hat hackers?

A

White hat hackers will find the weaknesses but will alert the owners so they can fix it. Black hat hackers are malicious.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an attack?

A

an actual attempt to harm a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is malware?

A

type of software that can steal your information and delete/modify files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does a virus work?

A

it comes attached to an executable code (program), spreads to other files when it’s running, replicates itself on the files, does damage, and tries to keep spreading

17
Q

What are worms?

A

Worms are like viruses except they can spread without attaching themselves onto something

18
Q

How are worms spread?

A

worms are spread through channels like networks

19
Q

What is adware?

A

software that displays advertisements and collects data

20
Q

What is a trojan?

A

malware that disguises itself as one thing but it actually does something else

21
Q

What is spyware?

A

malware that spies on you

22
Q

What’s an example of spyware?

A

monitors your screens, key presses, webcams and reports or streams this to another party

23
Q

What’s a keylogger?

A

A specific and common type of spyware that records your keystrokes

24
Q

What is ransomware?

A

a type of attack that holds your data/system hostage until you pay a ransom

25
What are 3 symptoms that might indicate a system is infected with malware?
1. Running slower than normal 2. Restarts on its own many times 3. Uses all or a higher than normal amount of memory
26
What is a botnet?
compromised internet-connected machines perform tasks controlled by the attacker
27
How do you separate an infected device from the rest of the network (botnet)? (3)
disconnect WiFi, unplug Ethernet, temporarily disable automatic system backup (might get re-infected by restoring infected file)
28
What should you do after malware has been cleaned from the system?
1. Turn the automatic backup back on 2. Create a manual safe restore point
29
What's a backdoor?
A secret entryway that attackers install in an already compromised system to grant continued access even if the user is aware their system is compromised
30
What is rootkit malware?
Allows admin-level modification to an OS
31
Why is a rootkit so hard to detect?
It runs malicious processes while also hiding those processes from the task manager
32
What is a logic bomb?
Malware that's intentionally installed and triggered to run after a certain time or event