Malware and Social Engineering Attacks

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/43

flashcard set

Earn XP

Description and Tags

Chapter 2

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

44 Terms

1
New cards

Malware

wide variety of damaging or annoying software that enters a computer system and performs unwanted actions.

2
New cards

Taxonomy of Malware

Spread, conceal, and profit

3
New cards

viruses

malicious computer code that reproduces itself on the same computer

4
New cards

infection

insert to a computer file/program; when infected program is launched the virus replicates itself by spreading to another file on same computer and activates its malicious payload.

5
New cards

virus actions

causes a computer to repeatedly crash, erase files from hard drive, make copies of itself to consume resources, turns off computers security settings, and reformat the hard disk drive.

6
New cards

virus spread

cannot automatically spread to another computer it relies on user actions to spread

7
New cards

Virus Program

infects executable files (.exe or .com)

8
New cards

Macro Virus

Take advtanage of the “trust” between the app and os

9
New cards

Resident

loaded into RAM each time computer is turned on & infects files opened by user or operating systems

10
New cards

Companion virus

Adds malicious copycat program to operating system

11
New cards

Worm

Malicious program, exploits application or operating systems vulnerability and sends copies of itself to other network devices

12
New cards

Worms may

Consume resources or leave behind a payload to harm infected systems

13
New cards

Trojans

program that does something other than advertised; typically executable programs contains hidden code that launches an attack

14
New cards

Logic Bomb

A computer code that lies dormant and difficult to detect before it is triggered

15
New cards

Backdoor

software code that circumvents normal security to give program access; common practice by developers and removed before deployment

16
New cards

Botnets

Computer is infected with program that allows it to be remotely controlled by attackers, infected computer called a zombie, and a groups of zombie computers together called botnet

17
New cards

Spamming

A botnet consisting of thousands of zombies enables an attacker to send massive amount of spam; some botnets can also harvest e-mail addresses

18
New cards

Spreading malware

Botnets can be used to spread malware and create new zombies and botnets; zombies have the ability to download and execute a file sent by the attacker

19
New cards

Attacking IRC networks

Botnets are often used for attacks against IRC network; the bot herder orders each botnet to connect a large number of zombies to the IRC network, which is flooded by service request and then cannot functions M

20
New cards

Manipulating online polls

Because each zombie has an unique internet protocol (IP) address, each "vote” by a zombie will have the same credibility as a vote cast by a real person; online games can be manipulated in a similar way

21
New cards

Denying services

Botnets can be flood a web server with thousands of requests and overwhelm it to the point that it cannot respond to legitimate request

22
New cards

Spyware

software that gathers information without user consent

23
New cards

Spyware effects

slows computer performance, causes systems instability, install new browsers menus or toolbars, place new shortcuts, hijack home page, increase pop-ups.

24
New cards

Adware

Program that delivers advertising content: in manner unexpected and unwanted by the user.

25
New cards

Adware downsides

may display objectionable content, pop-up ads slow computer or cause crashes, and unwanted ads can be a nuisance.

26
New cards

Keyloggers

Program that captures user’s keystrokes the information later retrieved by attacker. The attacker searches for user information. At times would look like a small hardware device or could be a software.

27
New cards

Social Engineering

Directly gathering information from individuals: Relies on the weaknesses of individuals, like trusting nature of indivduals. Psychological approaches & physical procedures.

28
New cards

Psychological approaches

persuade the victim to provide information or take action. Often involve impersonation, phishing, spam and hoaxes.

29
New cards

Impersonation

Attacker pretends to be someone else, a fictitious character

30
New cards

Phishing

Sending an email claiming to be from legitimate source & tries to trick user into giving private information

31
New cards

Pharming

automatically redirects user to fraudulent Web site

32
New cards

Spear phishing

Email messages target specific users

33
New cards

Whaling

Going after the “big fish” & targeting wealthy individuals

34
New cards

Vishing

Voice phishing

35
New cards

Spam

Unsolicited e-mail, one of the primary vehicles for distribution of malware

36
New cards

Spim

Targets instant messaging users

37
New cards

Image spam

uses graphical images of text, circumvents text-based filters, often contains nonsense text.

38
New cards

GIF layering

image spam divided into multiple images & layers make up one complete legible messages

39
New cards

Word splitting

Horizontally separating words & can still be read by human eye

40
New cards

Geometric variance

uses speckling and different colors so no two emails appear to be the same

41
New cards

Hoaxes

False warning or claim & may be first step in an attack

42
New cards

Dumpster diving

Digging through trash to find user information T

43
New cards

Tailgating

Following behind an authorized individual through an access door

44
New cards

Shoulder Surfing

form of social engineering attack where someone secretly observes another person private information