21 Questions
9 Views
4.9 Stars

Malicious Software (Malware) Chapter 67

This quiz covers the basics of malware, including its definition and characteristics according to NIST 800-83. Test your understanding of malicious software!

Created by
@WiseUnakite
1/21
Find out if you were right!
Create an account to continue playing and access all the benefits such as generating your own quizzes, flashcards and much more!
Quiz Team

Access to a Library of 520,000+ Quizzes & Flashcards

Explore diverse subjects like math, history, science, literature and more in our expanding catalog.

Questions and Answers

What is the primary function of the malware code?

To import a larger malware package

What happens when the malware code is inserted onto a system?

A larger malware package is imported

Where is the malware code typically inserted?

On a compromised system

What is the purpose of the initial malware code?

<p>To import a larger malware package</p> Signup and view all the answers

What is the role of the initial malware code in the malware attack?

<p>To import a larger malware package</p> Signup and view all the answers

What is the primary intention of malware according to NIST 800-83?

<p>To compromise the confidentiality, integrity, or availability of the victim's data</p> Signup and view all the answers

What is the term for cybercrime directed at business and political targets using a wide variety of intrusion technologies and malware?

<p>Advanced persistent threat</p> Signup and view all the answers

What is adware, as described in the text?

<p>Advertising that is integrated into software</p> Signup and view all the answers

What is the primary characteristic of an advanced persistent threat?

<p>It is a type of malware that is applied persistently and effectively to specific targets</p> Signup and view all the answers

What is the definition of malware provided by NIST 800-83?

<p>A program that is inserted into a system, usually covertly, with the intent of compromising the confidentiality, integrity, or availability of the victim's data</p> Signup and view all the answers

What is the primary goal of an advanced persistent threat?

<p>To compromise the confidentiality, integrity, or availability of the victim's data</p> Signup and view all the answers

What is the primary goal of ransomware like WannaCry?

<p>To demand a ransom payment in exchange for restoring access to encrypted files</p> Signup and view all the answers

What is mobile code, as defined by NIST SP 800-28?

<p>Code that can be shipped unchanged to a heterogeneous collection of platforms and executed with identical semantics</p> Signup and view all the answers

What is the primary method of propagation for mobile phone worms like Cabir?

<p>Through Bluetooth wireless connections</p> Signup and view all the answers

What is the goal of a drive-by-download attack?

<p>To exploit vulnerabilities in a user's browser or plugins to download and install malware</p> Signup and view all the answers

What is the primary purpose of a Trojan horse?

<p>To allow an attacker to accomplish functions that they could not accomplish directly</p> Signup and view all the answers

What is the goal of social engineering attacks?

<p>To trick users into divulging sensitive information</p> Signup and view all the answers

What is the primary purpose of keyloggers and spyware?

<p>To steal sensitive information from a system</p> Signup and view all the answers

What is phishing?

<p>A type of social engineering attack that leverages trust to steal sensitive information</p> Signup and view all the answers

What is the primary purpose of a backdoor?

<p>To allow an attacker to gain access to a system without being detected</p> Signup and view all the answers

What is the primary purpose of a rootkit?

<p>To hide malicious activity on a system from the user</p> Signup and view all the answers

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Study Notes

Malware

  • Malware is a program inserted into a system, usually covertly, with the intent of compromising the confidentiality, integrity, or availability of the victim's data, applications, or operating system.
  • NIST 800-83 defines malware as a program that is inserted into a system, usually covertly, with the intent of compromising the confidentiality, integrity, or availability of the victim's data, applications, or operating system.

Types of Malware

  • Advanced Persistent Threat (APT): cybercrime directed at business and political targets, using a wide variety of intrusion technologies and malware, applied persistently and effectively to specific targets over an extended period, often attributed to state-sponsored organizations.
  • Adware: advertising that is integrated into software.
  • Ransomware: a type of malware that encrypts files and demands a ransom payment in exchange for the decryption key.
  • WannaCry: a ransomware attack in May 2017 that spread extremely fast over a period of hours to days, infecting hundreds of thousands of systems belonging to both public and private organizations in more than 150 countries.
  • Mobile Code: programs that can be shipped unchanged to a heterogeneous collection of platforms and executed with identical semantics.
  • Mobile Phone Worms: worms that spread through Bluetooth wireless connections or MMS, targeting smartphones and deleting data or forcing the device to send costly messages.

Malware Propagation

  • Drive-By-Downloads: exploits browser and plugin vulnerabilities, allowing malware to be downloaded and installed on a system without the user's knowledge or consent.
  • Social Engineering: "tricking" users to assist in the compromise of their own systems.
  • Spam: unsolicited bulk e-mail, often used to spread malware or phish for sensitive information.
  • Trojans: programs or utilities containing harmful hidden code, used to accomplish functions that the attacker could not accomplish directly.

Payloads

  • Information Theft: malware that steals sensitive information, such as login credentials or financial information.
  • Stealthing: malware that hides its presence on a system, such as rootkits that subvert the operating system's security mechanisms.
  • Backdoors: secret entry points into a program, allowing the attacker to gain access and bypass security access procedures.

Malware Countermeasures

  • Prevention: the ideal solution to the threat of malware, involving policy, awareness, vulnerability mitigation, and threat mitigation.
  • Detection: technical mechanisms can be used to detect malware, such as sandbox analysis and host-based behavior-blocking software.
  • Removal: malware can be removed from a system, but this may not always be possible or effective.
  • Perimeter Scanning Approaches: anti-virus software and intrusion detection systems can be used to scan for malware at the network perimeter.

Trusted by students at

More Quizzes Like This

Use Quizgecko on...
Browser
Browser