Security+ SY0-701 - Chapter 3

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/35

flashcard set

Earn XP

Description and Tags

CompTIA Security+ Study Guide Exam SY0-701

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

36 Terms

1
New cards

Malware

Software intentionally designed to cause harm to systems and devices, networks, or users.

2
New cards

Ransomware

Malware that takes over a computer system and demands financial compensation.

3
New cards

Phishing Campaign

Delivery device for a significant number of ransomware attacks.

4
New cards

Acronym: C&C

Command and Control

5
New cards

IoCs for Ransomware

  • C&C traffic and/or contact to known malicious IP addresses

  • Use of legitimate tools in abnormal ways to retain control of a compromised system

  • Lateral movement processes that seek to attack or gain information about other systems

  • Encryption of files

  • Notices to end users of the encryption process with demands for financial compensation

  • Data exfiltration, especially large file transfers

6
New cards

File Backup System

One of the most important defenses against ransomware.

7
New cards

Trojan

Malware disguised as legitimate software.

8
New cards

IoCs for Trojans

  • Signatures for specific malware applications or downloadable files

  • C&C hostnames and IP addresses

  • Folders or files created on target devices

9
New cards

Acronym: EDR

Endpoint Detection and Response

10
New cards

Mitigation Practices for Spyware and Trojans

  • User awareness training

  • Control of software allowed on devices and systems

  • Antimalware, EDR, and other such tools

11
New cards

Botnet

A collection of compromised systems remotely controlled and told what to do.

12
New cards

Worm

Malware that spreads itself without requiring user interaction.

13
New cards

IoCs for Worms

  • Known malicious files

  • Downloads of additional components from remote systems

  • C&C contact to remote systems

  • Malicious behaviors using systems commands for injection and other activities

  • Hands-on keyboard attacker activity

14
New cards

Acronym: IPS

Intrusion Prevention System

15
New cards

Mitigation Practices for Worms

  • Firewalls, IPS devices, network segmentation

  • Patching and configuring services to limit attack services

  • Antimalware, EDR, and other such tools

  • Reinstallation or resetting to original firmware

16
New cards

Spyware

Malware designed to obtain information about an individual, organization, or system.

17
New cards

Stalkerware

A type of spyware used to illicitly monitor partners in relationships.

18
New cards

IoCs for Spyware

  • Remote-access and remote-control-related indicators

  • Known software file fingerprints

  • Malicious processes, often disguised as systems processes

  • Injection attacks against browsers

19
New cards

Bloatware

Unwanted applications installed on systems by manufacturers.

20
New cards

Virus

Malware that self-copies and self-replicates once activated. Typically has a trigger and a payload.

21
New cards

Types of Viruses

  • Memory-resident

  • Non-memory-resident

  • Boot Sector

  • Macro

  • Email

  • Fileless

22
New cards

Memory-resident

A type of virus that remains in memory while the device is running.

23
New cards

Non-memory-resident

A type of virus that executes, spreads, and then shuts down.

24
New cards

Boot Sector

A type of virus that resides in the boot sector of a drive or storage media.

25
New cards

Macro

A type of virus which uses macros or code inside of word processing software or other tools to spread.

26
New cards

Email

A type of virus that is spread via email either as attachments or as a small part of the email itself using flaws inside email clients.

27
New cards

Fileless

A type of memory-resident virus that spreads via spam email and malicious sites and exploit flaws in browser plug-ins and web browsers themselves.

28
New cards

IoC for Fileless Viruses

Registry entry to repeat shell code and download execution at boot.

29
New cards

Keylogger

A program designed to capture keystrokes from a keyboard or other inputs such as mouse movement, touchscreen inputs, or credit card swipes from attached devices.

30
New cards

IoCs for Keyloggers

  • File hashes and signatures

  • Exfiltration activity to command and control systems

  • Process names

  • Known reference URLs

31
New cards

Logic Bomb

Malware placed inside existing programs that will activate when certain conditions are met.

32
New cards

Malware Analysis Techniques

  • Online analysis tools such as VirusTotal

  • Sandbox tools in a protected environment.

  • Manual code analysis, particularly with scripts and interpreted code such as Python and Perl

  • Tools like strings, to look for recoverable artifacts

33
New cards

Acronym: MBR

Master Boot Record

34
New cards

Driver Hooking

The practice of intercepting or modifying the normal behavior of a driver by inserting a piece of code (called a "hook") that allows you to monitor or alter operations before they reach the underlying system.

35
New cards

Rootkit

Malware specifically designed to allow attackers to access a system through a backdoor. Concealment techniques include hooking file-system drivers and infecting start-up code in the MBR of a disk.

36
New cards

IoCs for Rootkits

  • File hashes and signatures

  • Command and control domains, IP addresses, and systems

  • Behavior-based identification like the creation of services, executables, configuration changes, file access, and command invocation

  • Opening ports or creation of reverse proxy tunnels