Week 7 - Malware Flashcards

(28 cards)

1
Q

What is Malware?

A

Malware is software designed to perform malicious activities on a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is zero day malware?

A

Malware that exploits vulnerabilities that have not been patched yet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 3 types of Malware?

A

viruses, trojans and Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a virus?

A

a malicious executable code that multiplies itself by attaching to a host document

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a polymorphic virus?

A

A polymorphic virus mutates as it spreads to avoid detection, making it harder to identify using signature-based antivirus software.

it leaves a signature to indicate a file has been infected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the three main parts of a virus?

A
  • Concealment (hiding from detection)
  • Propagation (spreading to other files)
  • payload (carrying out malicious actions)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a logic bomb virus?

A

A logic bomb virus activates when specific conditions are met.

e.g
deleting files after a certain event occurs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a time bomb virus?

A

A time bomb virus activates at specified time or date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How else can we classify viruses?

A

Bases on the infection mechanism

could be a file infector, boot sector, email virus, operating system infection mechanism.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a worm?

A

a self-replicating malware program that spreads across networks without human interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a trojan?

A

malware disguised as harmless program that hides malicious software, like keyloggers or creates a backdoor for attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the three main areas of malware prevention and detection?

A
  • increasing user awareness (avoidance of downloading suspicious files)
  • technical solutions (intrusion detection, firewalls)
  • Antivirus software (identifies and removes malware from an infected computer)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does antivirus work?

A

use of virus dictionaries to search every file for known virus signatures

requires regular updates and not effective against polymorphic viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an integrity checker?

A

alerts the user when a very old file has been recently modified. helps detect damage caused by viruses but not before the infection happens.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is activity monitoring in antivirus software?

A

monitoring activities of all programs and looking for suspicious behavior. (file modification, boot up time taking longer than usual)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is quarantining in activity monitoring ?

A

where the suspected file is placed into a new location where it can’t impact the system

e.g

sandbox - a secure environment isolated from OS

17
Q

What is a tarpit in cybersecurity?

A

a security mechanism that intentionally delays network connections to a sever, slowing down malware spread

18
Q

How do tarpits help in mitigating worm infections?

A

slows the spread of worms by increasing the time it takes for infected packets to reach new hosts

19
Q

How do tarpits help mitigate Denial of Service (DoS) attacks?

A

slows down the response time for each incoming HTTP request in a DoS attack, without impacting legitimate users, thus slowing the DoS attack.

20
Q

What is a honeypot in cybersecurity?

A

a decoy computer system that is set up to attract attackers. contains no valuable information

21
Q

How do honeypots help gather information about attackers?

A

Appear to contain valuable information to lure attackers. allowing defenders to gather information about attacker’s methods and intentions

22
Q

What are the two types of Malware Analysis?

A

Static and Dynamic

23
Q

What is static analysis?

A

examining files for malicious intent without running the code.

24
Q

How do we use Static analysis?

A

tools like disassemblers and network analysers user to look at file names, hashes and IP addresses.

25
What is a limitation of static analysis?
May miss complicated malware that only shows malicious behaviour during runtime
26
What is dynamic analysis in malware detection?
executes suspected files in a controlled environment (sandbox)
27
What is a limitation of dynamic analysis?
attackers have become skilled at detecting sandboxes and will use techniques to hide malicious code inside the sandbox
28
How do we use dynamic analysis?
allows security professionals to observe malware behavior without letting it affect the system or network. obtaining an understanding of the malicious code's behaviour