Podcast
Questions and Answers
Security ______ are any kind of software or hardware defect.
Security ______ are any kind of software or hardware defect.
vulnerabilities
An ______ is the term used to describe a program written to take advantage of a known vulnerability.
An ______ is the term used to describe a program written to take advantage of a known vulnerability.
exploit
Software vulnerabilities are usually introduced by errors in the operating system or ______ code.
Software vulnerabilities are usually introduced by errors in the operating system or ______ code.
application
In 2015, a major vulnerability, called ______ Knock, was discovered in Cisco IOS.
In 2015, a major vulnerability, called ______ Knock, was discovered in Cisco IOS.
To avoid this, always verify the ______ of the downloaded IOS image (copy) and limit the physical access of the equipment to authorized personnel only.
To avoid this, always verify the ______ of the downloaded IOS image (copy) and limit the physical access of the equipment to authorized personnel only.
The goal of software updates is to stay ______ and avoid exploitation of vulnerabilities.
The goal of software updates is to stay ______ and avoid exploitation of vulnerabilities.
Hardware vulnerabilities are often introduced by hardware ______ flaws.
Hardware vulnerabilities are often introduced by hardware ______ flaws.
Based on that design flaw, an exploit called ______ was created.
Based on that design flaw, an exploit called ______ was created.
This ______ occurs when data is written beyond the limits of a buffer.
This ______ occurs when data is written beyond the limits of a buffer.
Programs often work with data ______.
Programs often work with data ______.
A malicious user could craft an image file with invalid image ______.
A malicious user could craft an image file with invalid image ______.
[Blank] conditions is when the output of an event depends on ordered or timed outputs.
[Blank] conditions is when the output of an event depends on ordered or timed outputs.
Do not attempt to create your own security ______ because it will likely introduce vulnerabilities.
Do not attempt to create your own security ______ because it will likely introduce vulnerabilities.
To protect the machine and the data it contains, ______ access must be restricted.
To protect the machine and the data it contains, ______ access must be restricted.
[Blank] is any code that can be used to steal data, bypass access controls, or cause harm to, or compromise a system.
[Blank] is any code that can be used to steal data, bypass access controls, or cause harm to, or compromise a system.
Bots quietly wait for commands provided by the ______.
Bots quietly wait for commands provided by the ______.
[Blank] hold a computer system or the data captive until a payment is made.
[Blank] hold a computer system or the data captive until a payment is made.
[Blank] persuade the user to take a specific action based on fear.
[Blank] persuade the user to take a specific action based on fear.
[Blank] create a backdoor.
[Blank] create a backdoor.
A computer infected by a ______ must be wiped and reinstalled.
A computer infected by a ______ must be wiped and reinstalled.
A ______ is disguised malware.
A ______ is disguised malware.
______ replicate themselves and can slow down networks.
______ replicate themselves and can slow down networks.
______ take control over a device without the user’s knowledge.
______ take control over a device without the user’s knowledge.
______ is a variation of man-in-the-middle that take control over a mobile device
______ is a variation of man-in-the-middle that take control over a mobile device
______ are attached to other executable files.
______ are attached to other executable files.
Many malware and techniques exist to provide attackers with ______ capabilities.
Many malware and techniques exist to provide attackers with ______ capabilities.
An increase in ______ usage can be a symptom of malware infection.
An increase in ______ usage can be a symptom of malware infection.
The ______ can activates at a specific time
The ______ can activates at a specific time
______ are found in image files, audio files or games.
______ are found in image files, audio files or games.
Flashcards
Security Vulnerabilities
Security Vulnerabilities
Software or hardware defects that can be exploited.
Exploit
Exploit
Program designed to take advantage of a known vulnerability.
Attack
Attack
The act of using an exploit against a vulnerability.
Software Vulnerabilities
Software Vulnerabilities
Signup and view all the flashcards
SYNful Knock
SYNful Knock
Signup and view all the flashcards
Project Zero
Project Zero
Signup and view all the flashcards
Hardware Vulnerabilities
Hardware Vulnerabilities
Signup and view all the flashcards
Rowhammer
Rowhammer
Signup and view all the flashcards
Buffer Overflow
Buffer Overflow
Signup and view all the flashcards
Security Research
Security Research
Signup and view all the flashcards
Non-validated input
Non-validated input
Signup and view all the flashcards
Race conditions
Race conditions
Signup and view all the flashcards
Weaknesses in security practices
Weaknesses in security practices
Signup and view all the flashcards
Access-control problems
Access-control problems
Signup and view all the flashcards
Malware
Malware
Signup and view all the flashcards
Spyware
Spyware
Signup and view all the flashcards
Ransomware
Ransomware
Signup and view all the flashcards
Scareware
Scareware
Signup and view all the flashcards
Rootkits
Rootkits
Signup and view all the flashcards
Bot
Bot
Signup and view all the flashcards
Virus
Virus
Signup and view all the flashcards
Trojan Horse
Trojan Horse
Signup and view all the flashcards
Worm
Worm
Signup and view all the flashcards
Man-In-The-Middle (MitM)
Man-In-The-Middle (MitM)
Signup and view all the flashcards
Man-In-The-Mobile (MitMo)
Man-In-The-Mobile (MitMo)
Signup and view all the flashcards
Malware Symptoms
Malware Symptoms
Signup and view all the flashcards
Network Slowdown
Network Slowdown
Signup and view all the flashcards
File Modification
File Modification
Signup and view all the flashcards
Unwanted Processes
Unwanted Processes
Signup and view all the flashcards
Study Notes
Chapter 2: Attacks, Concepts, and Techniques
- This chapter covers security vulnerabilities, exploits, and attacks.
- Security vulnerabilities are flaws in software or hardware.
- Malicious users try to exploit vulnerabilities.
- An exploit is a program designed to take advantage of a known vulnerability.
- The act of using an exploit is called an attack.
Finding Security Vulnerabilities
- Security vulnerabilities are defects in software or hardware.
- Malicious users try to exploit known vulnerabilities.
- An exploit is a program written to take advantage of a vulnerability.
- Using an exploit against a vulnerability is an attack.
Software Vulnerabilities
- Software flaws often lead to vulnerabilities.
- Operating systems (like Microsoft, Apple) regularly release patches and updates.
- The SYNful Knock vulnerability in Cisco IOS (2015) allowed attackers to control routers.
- This vulnerability permitted network monitoring and infection.
- Updates were needed to address this vulnerability.
- Maintaining up-to-date software is crucial to avoid exploitation.
Software Vulnerabilities (Continued)
- The goal of software updates is to patch vulnerabilities.
- Security researchers identify vulnerabilities and some companies have dedicated teams like Project Zero.
- Google's Project Zero aims to find software vulnerabilities.
Hardware Vulnerabilities
- Design flaws in hardware create vulnerabilities.
- RAM memory's close capacitors create Rowhammer exploit vulnerability.
- Changes in one capacitor can affect neighboring ones.
- Hardware vulnerabilities often target specific device models.
- Hardware exploits are more common in targeted attacks.
Categorizing Security Vulnerabilities: Software
- Buffer Overflow: Data written beyond buffer limits can lead to system crash or data compromise.
- Non-validated Input: Malicious input (e.g., images with wrong dimensions) can result in buffer allocation errors.
- Race Conditions: Output of an event can depend on timing sensitivity, if not executed properly a system is vulnerable.
Categorizing Security Vulnerabilities: Other Issues
- Weaknesses in security practices: Avoid creating security algorithms. Instead, leverage well-established and tested libraries.
- Access-Control Problems: Restriction of physical access to systems/equipment is critical to mitigate issues.
- Encryption techniques are vital.
Types of Malware
- Malware is malicious software.
- Malware can steal data, circumvent access controls, or cause harm.
- Spyware: spies on system activities.
- Adware: displays advertisements.
- Bots/Botnets: perform tasks at attacker's command.
- Ransomware: holds systems hostage until payment is received.
- Scareware: uses fear tactics to trick users into installing malware.
- Rootkits: malicious software with a backdoor to system, hides from forensic tools.
- Viruses: execute attached to files, sometimes harmless, sometime destructive.
- Trojan Horses: Disguised malware found in games/media.
- Worms: replicate and spread quickly across networks.
- Man-in-the-middle (MitM) attacks: intercept communication between two parties.
- Man-in-the-mobile (MitMo) attacks: similar to MitM but target mobile devices.
Symptoms of Malware
- Signs of malware include unusual CPU usage, computer slowdowns, freezes, network issues, and file modifications or deletions.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz covers Chapter 2 on security vulnerabilities, exploits, and attacks. Learn about various software flaws and how malicious users exploit them. Discover the significance of timely updates and patches in maintaining system security.