malware and social engineering

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/26

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

27 Terms

1
New cards

malware components

  1. propagation mechanism- how it spreads

  2. payload- malicious action the malware performs

2
New cards

virus

spread by human action

3
New cards

worm

spread by themselves

4
New cards

trojan horse

disguise themselves as beneficial software but carries hidden malicious software

5
New cards

adware

displays advertisements

some mechanisms include changing the default search engine, displaying pop ups, or replacing legit ads with other ads

6
New cards

spyware

gathers info without the user’s knowledge or consent

--techniques include logging keystrokes, monitoring web browsing, and searching hard drvies and cloud storage

7
New cards

ransomware

blocks access until ransom is paid

8
New cards

cryptomalware

takes over user’s system capacity and uses it to mine cryptocurrency

9
New cards

scareware

designed to look like a legit warning but is a scam

10
New cards

preventing malware

  • anti malware software

  • security patches

  • education

11
New cards

backdoor

provide workaround access

-mechanisms include hardcoded accounts, default passwords, and unknown access channels

12
New cards

logic bomb

deliver a triggered payload

13
New cards

rootkit

escalates user privileges. Payloads can include backdoors, botnet agents, adware/spyware

user mode rootkits: run w normal user privileges, are easy to write and difficult to detect

kernel mode rootkit: run with system privileges, are difficult to write and easy to detect

14
New cards

fileless viruses

only stay in memory to avoid detection

15
New cards

what is a common command and control mechanism for botnets?

IRC

16
New cards

Developers wishing to sign their code must have a _____.

digital certificate

17
New cards

hacktivist

seek to use hacking tools to advance political and social agendas

18
New cards

white hats

authorized- operates with permission and good intent

19
New cards

grey hats

semi authorized- operate without permission but with good intent

20
New cards

black hats

unauthorized- operate illegally with malicious intent

21
New cards

HR practices to control insider threats

  • perform background checks to uncover past legal issues

  • give users only the permissions that they need

  • require multiple users to carry out sensitive operations

  • mandatory vacations for critical staff

22
New cards

Shadow IT

exposes the organization to risk from the use of unapproved technology services

23
New cards

advanced persistent threats (APTs)

  • well funded and highly skilled

  • typically government sponsored

  • have access to zero days and other sophisticated weapons

  • work methodically to gain access to a target

24
New cards

social engineering tactics

  • authority

  • intimidation

  • consensus

  • scarcity

  • urgency

  • familiarity

25
New cards

pharming

use fake websites to capture credentials

26
New cards

pretexting attack

impersonate a consumer

27
New cards

watering hole attack

  • users trust the websites they visit, to some extent

  • browser and add ons often have vulnerabilities

  • users are conditioned to click “ok” on security warnings