Week 2 Flashcards

1
Q

What is a worm?

A

A program that seeks machines to infect and each infected machine is used for attacks on other machines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name 3 ways worms can be replicated

A
  • Remote login capability
  • Emails or instant messaging
  • File sharing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name 3 ways worms can identify their targets

A

1 Random
2 Hit-list
3 Local subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List the 3 phases of worm propagation

A

1) Slow start phase
2) Fast spread phase
3) Slow finish phase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the Morris Worm?

A

Earliest significant worm infection designed to spread on UNIX systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name 3 worm technologies

A

1 Polymorphic
2 Metamorphic
3 Multi-platform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Mobile Code?

A

Programs that can be shipped unchanged to a heterogeneous collection of platforms and executed with identical semantics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Mobile code often acts a mechanism for…

A

worms, viruses, trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do mobile phone worms propagate

A

Through bluetooth wireless connections or MMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Drive-By-Download?

A

When the user views a webpage controlled by the attacker, it contains code that allows the bug to download and install malware on the system without the user’s knowledge or consent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Watering-Hole Attack?

A

The attacker researches their intended victims to identify websites they are likely to visit, then scans these sites to identify those with vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Malvertising?

A

Places malware in the form of adverts on websites without actually compromising them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Clickjacking/UI redress attack?

A

The attacker hijacks clicks meant for one action routing user to another page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Social Engineering?

A

Tricking” users to assist in the compromise of their own systems. e.g. spam, trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a Botnet?

A

A collection of bots capable of acting in a coordinated manner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

List 3 uses of botnets

A
  • Spamming
  • Online polls/games
  • Spreading new malware
17
Q

What are Keyloggers?

A

Records keystrokes and then filtering mechanism that only returns information close to keywords (“login”, “password”)

18
Q

What is spyware?

A

Subverts the compromised machine to allow monitoring of a wide range of activity on the system.

19
Q

What is a Backdoor (AKA trapdoor)?

A

Secret entry point into a program allowing the attacker to gain access and bypass the security access procedures

20
Q

Ideal solution to the threat of malware is…

A

Prevention

21
Q

List 3 elements of prevention

A
  • Policy
  • Awareness
  • Threat mitigation
22
Q

What is user authentication?

A

The process of establishing confidence in user identities that are presented electronically to an information system.

23
Q

List 3 means of authentication

A
  • Something the individual knows (password)
  • Something the individual possesses (smartcard)
  • Something the individual is (finger-print)
24
Q

What is multi-factor authentication?

A

A security system that requires more than one method of authentication

25
Q

What are the 3 concepts of Risk Assessment for user authentication

A

1- Assurance Level
2- Potential impact
3- Areas of risk

26
Q

What is Assurance Level?

A

The degree of confidence in the vetting process used to establish the identity of the individual to whom the credential was issued

27
Q

What is Potential impact?

A

Defines three levels (low, moderate, high) of potential impact on individuals should there be a breach of security

28
Q

List 3 password vulnerabilities

A
  • Offline dictionary attack
  • Specific account attack
  • Popular password attack
29
Q

What is Password cracking?

A

The process of recovering passwords from data that have been stored in or transmitted by a computer system.

30
Q

Explain 3 types of password cracking

A

1) Dictionary attacks
2) Rainbow table attacks
3) John the Ripper