Cybersecurity Chapter 2: Attacks and Techniques
28 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the term used to describe a program written to take advantage of a known vulnerability?

  • Malware
  • Patch
  • Update
  • Exploit (correct)
  • Software vulnerabilities are typically introduced by errors in operating system or application code.

    True (A)

    What is one way to avoid the SYNful Knock vulnerability when installing a new version of IOS?

    Verify the integrity of the downloaded IOS image

    The goal of software updates is to stay current and avoid ________ of vulnerabilities.

    <p>exploitation</p> Signup and view all the answers

    Match the following items with their corresponding information:

    <p>Vulnerability = A software or hardware defect. Exploit = A program that takes advantage of a vulnerability. Attack = The act of using an exploit against a vulnerability. Buffer Overflow = When data is written beyond the limits of a buffer.</p> Signup and view all the answers

    Which major vulnerability was discovered in Cisco IOS in 2015?

    <p>SYNful Knock (B)</p> Signup and view all the answers

    Hardware vulnerabilities are generally widespread and affect many different device models.

    <p>False (B)</p> Signup and view all the answers

    A ________ occurs when data is written beyond the limits of a buffer.

    <p>buffer overflow</p> Signup and view all the answers

    Which of the following can a buffer overflow lead to?

    <p>All of the above (D)</p> Signup and view all the answers

    Which type of vulnerability occurs when the output of an event depends on ordered or timed outputs?

    <p>Race condition (D)</p> Signup and view all the answers

    Creating your own security algorithms is recommended for enhanced security.

    <p>False (B)</p> Signup and view all the answers

    What is malware?

    <p>Malware is any code used to steal data, bypass access controls, or cause harm to a system.</p> Signup and view all the answers

    __________ holds a computer system or data captive until a payment is made.

    <p>Ransomware</p> Signup and view all the answers

    Match the malware type with its description:

    <p>Spyware = Used to steal data from a system Ransomware = Holds data captive until payment is made Rootkit = Creates a backdoor Scareware = Persuades the user to take a specific action based on fear</p> Signup and view all the answers

    Which of the following describes a bot?

    <p>A robot that quietly waits for commands (A)</p> Signup and view all the answers

    Physical access control is not a necessary part of computer security; software protections are sufficient.

    <p>False (B)</p> Signup and view all the answers

    How does scareware typically trick users?

    <p>Scareware forges pop-up windows and messages that resemble operating system dialogs, claiming the system is at risk.</p> Signup and view all the answers

    A program that processes an image receives data that contains malicious content due to _______________.

    <p>Non-validated input</p> Signup and view all the answers

    Which of these malware types is primarily designed to create a persistent backdoor on a system?

    <p>Rootkit (B)</p> Signup and view all the answers

    Which type of malware replicates itself and can slow down networks?

    <p>Worm (B)</p> Signup and view all the answers

    A computer infected by a rootkit can be cleaned with antivirus software without needing to be wiped and reinstalled.

    <p>False (B)</p> Signup and view all the answers

    What is a common symptom of malware infection related to CPU usage?

    <p>Increase in CPU usage</p> Signup and view all the answers

    A man-in-the-middle attack intercepts user information before relaying it to its intended ______.

    <p>destination</p> Signup and view all the answers

    Which of the following methods can viruses use to spread?

    <p>All of the above (E)</p> Signup and view all the answers

    Trojans can only be found in executable files.

    <p>False (B)</p> Signup and view all the answers

    What is the purpose of a Man-In-The-Mobile (MitMo) attack?

    <p>To take control over a mobile device and exfiltrate user-sensitive information.</p> Signup and view all the answers

    Rootkits are hard to detect because they modify system forensics and ______ tools.

    <p>monitoring</p> Signup and view all the answers

    Which of these is MOST likely to be stolen during a Man-In-The-Middle attack?

    <p>Financial information (D)</p> Signup and view all the answers

    Flashcards

    Non-validated input

    Data input that hasn't been checked for validity, allowing malicious content.

    Race conditions

    A vulnerability where events occur out of the intended order or timing, affecting outputs.

    Weaknesses in security practices

    Using homemade security algorithms instead of established libraries can create vulnerabilities.

    Access-control problems

    Issues managing who can physically access resources, sometimes leading to data breaches.

    Signup and view all the flashcards

    Malware

    Malicious software designed to steal data or damage systems.

    Signup and view all the flashcards

    Spyware

    Malware that secretly monitors user activity without consent.

    Signup and view all the flashcards

    Adware

    Software that displays unwanted ads and may track user behavior.

    Signup and view all the flashcards

    Ransomware

    Malware that encrypts data and demands payment to unlock it.

    Signup and view all the flashcards

    Scareware

    Malware that tricks users into fearing for their system, prompting action.

    Signup and view all the flashcards

    Rootkits

    Malware that provides unauthorized access to the system by creating backdoors.

    Signup and view all the flashcards

    Security Vulnerabilities

    Defects in software or hardware that can be exploited by malicious users.

    Signup and view all the flashcards

    Exploit

    A program designed to take advantage of a known vulnerability.

    Signup and view all the flashcards

    Attack

    The act of using an exploit against a software or hardware vulnerability.

    Signup and view all the flashcards

    Software Vulnerabilities

    Errors in operating system or application code leading to security risks.

    Signup and view all the flashcards

    Major Vulnerability Example

    SYNful Knock, a vulnerability in Cisco IOS discovered in 2015.

    Signup and view all the flashcards

    Google Project Zero

    A dedicated team for finding software vulnerabilities.

    Signup and view all the flashcards

    Hardware Vulnerabilities

    Design flaws in hardware that can lead to security issues.

    Signup and view all the flashcards

    Rowhammer

    An exploit created due to RAM design flaws.

    Signup and view all the flashcards

    Buffer Overflow

    Occurs when data is written beyond a buffer's limits.

    Signup and view all the flashcards

    Purpose of Software Updates

    To stay current and avoid exploitation of known vulnerabilities.

    Signup and view all the flashcards

    Virus

    Malware that attaches to other files, requires activation, and can be harmless or destructive.

    Signup and view all the flashcards

    Trojan horse

    Disguised malware that appears in non-executable files like images or games.

    Signup and view all the flashcards

    Worm

    Self-replicating malware that spreads rapidly and can slow down networks.

    Signup and view all the flashcards

    Man-In-The-Middle (MitM)

    An attack where an attacker intercepts communication between two parties without them knowing.

    Signup and view all the flashcards

    Man-In-The-Mobile (MitMo)

    A variant of MitM that targets mobile devices to exfiltrate sensitive information.

    Signup and view all the flashcards

    CPU Usage Increase

    A symptom of malware indicating higher processing demand than normal.

    Signup and view all the flashcards

    Slow Computer Speed

    A common symptom of malware, leading to noticeable delays in operations.

    Signup and view all the flashcards

    Unknown Processes

    Processes running on a computer that are unfamiliar or suspicious, often indicating malware.

    Signup and view all the flashcards

    Exfiltration

    The unauthorized transfer of sensitive data from a device, often used in attacks.

    Signup and view all the flashcards

    Study Notes

    Chapter 2: Attacks, Concepts, and Techniques

    • This chapter covers security vulnerabilities, exploits, attacks, and malware.

    Finding Security Vulnerabilities

    • Security vulnerabilities are flaws in software or hardware.
    • Malicious users exploit vulnerabilities.
    • An exploit is a program designed to take advantage of a vulnerability.
    • An attack is the act of using an exploit against a vulnerability.

    Software Vulnerabilities

    • Software vulnerabilities often arise from errors in operating systems or application code.
    • Operating system vendors regularly release patches and updates to address these flaws.
    • SYNful Knock (2015) was a significant vulnerability in Cisco IOS, allowing attackers to control routers, monitor network communication, and infect other devices.

    Software Vulnerabilities (continued)

    • Software updates aim to prevent exploitation of vulnerabilities.
    • Some companies have dedicated security teams focused on discovering vulnerabilities in software, like Google's Project Zero.

    Hardware Vulnerabilities

    • Hardware vulnerabilities stem from design flaws.
    • Rowhammer is an exploit that takes advantage of close capacitor placement in RAM memory, affecting neighboring capacitors.
    • Hardware vulnerabilities are often specific to device models.
    • Hardware exploits are prevalent in targeted attacks.

    Categorizing Security Vulnerabilities: Software

    • Buffer Overflow: Writing data beyond a buffer's allocated memory, potentially causing system crashes, data compromises, or privilege escalation.
    • Non-validated Input: Programs accepting potentially malicious data without proper validation, leading to memory issues and security flaws (e.g., malicious image files with incorrect dimensions).
    • Race Conditions: Event outcomes depending on the order or timing of events, when these are not properly synchronized can lead to security vulnerabilities.
    • Weaknesses in Security Practices: Avoiding creating custom security algorithms and relying on pre-tested security libraries to avoid introducing new weaknesses.

    Categorizing Security Vulnerabilities: Access-Control Problems

    • Proper management of physical access to equipment is crucial.
    • Access controls define who can access resources.
    • Operating systems sometimes cannot enforce access restrictions if read or write access directly to storage devices bypass them. Protecting machines and data requires access restrictions and data encryption.

    Types of Malware

    • Malware is malicious software.
    • Spyware: Monitors user activity.
    • Adware: Displays advertisements.
    • Bot: A malicious program acting under commands from a botnet.
    • Ransomware: Holds systems or data hostage until a ransom is paid. It encrypts data, making it inaccessible.
    • Scareware: Attempts to trick users into taking actions by using fear and posing as operating system components.
    • Rootkits: Backdoor access, modifies system utilities, and are very difficult to detect. Requires a wipe and reinstall to remove.
    • Virus: Self-replicating code attached to executable files. Can be harmless or destructive and can spread through various means.
    • Trojan Horse: A disguised malware that conceals malicious code. Commonly disguised as benign files, often found in images, videos, audio clips.
    • Worms: Self-replicating malware that spreads over networks. They often cause significant network congestion.
    • Man-in-the-Middle (MitM) & Man-in-the-Mobile (MitMo): Intercepting communication between two parties without their knowledge to steal information like financial data, or capture two step authentication SMS messages.

    Symptoms of Malware

    • Increased CPU usage, decreased computer speed, frequent freezes/crashes, network issues, file modifications or deletions, appearance of unknown files/programs, erratic program behavior, unauthorized email sending.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Explore the critical aspects of security vulnerabilities, exploits, and attacks in this chapter. Understand how malicious users exploit software flaws and learn about significant vulnerabilities like SYNful Knock. This quiz will test your knowledge on detecting and mitigating security risks.

    More Like This

    Use Quizgecko on...
    Browser
    Browser