Security Vulnerabilities and Exploits Chapter 2
29 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Security ______ are any kind of software or hardware defect.

vulnerabilities

An ______ is the term used to describe a program written to take advantage of a known vulnerability.

exploit

Software vulnerabilities are usually introduced by errors in the operating system or ______ code.

application

In 2015, a major vulnerability, called ______ Knock, was discovered in Cisco IOS.

<p>SYNful</p> Signup and view all the answers

To avoid this, always verify the ______ of the downloaded IOS image (copy) and limit the physical access of the equipment to authorized personnel only.

<p>integrity</p> Signup and view all the answers

The goal of software updates is to stay ______ and avoid exploitation of vulnerabilities.

<p>current</p> Signup and view all the answers

Hardware vulnerabilities are often introduced by hardware ______ flaws.

<p>design</p> Signup and view all the answers

Based on that design flaw, an exploit called ______ was created.

<p>Rowhammer</p> Signup and view all the answers

This ______ occurs when data is written beyond the limits of a buffer.

<p>vulnerability</p> Signup and view all the answers

Programs often work with data ______.

<p>input</p> Signup and view all the answers

A malicious user could craft an image file with invalid image ______.

<p>dimensions</p> Signup and view all the answers

[Blank] conditions is when the output of an event depends on ordered or timed outputs.

<p>race</p> Signup and view all the answers

Do not attempt to create your own security ______ because it will likely introduce vulnerabilities.

<p>algorithms</p> Signup and view all the answers

To protect the machine and the data it contains, ______ access must be restricted.

<p>physical</p> Signup and view all the answers

[Blank] is any code that can be used to steal data, bypass access controls, or cause harm to, or compromise a system.

<p>malware</p> Signup and view all the answers

Bots quietly wait for commands provided by the ______.

<p>attacker</p> Signup and view all the answers

[Blank] hold a computer system or the data captive until a payment is made.

<p>ransomware</p> Signup and view all the answers

[Blank] persuade the user to take a specific action based on fear.

<p>scareware</p> Signup and view all the answers

[Blank] create a backdoor.

<p>rootkits</p> Signup and view all the answers

A computer infected by a ______ must be wiped and reinstalled.

<p>rootkit</p> Signup and view all the answers

A ______ is disguised malware.

<p>trojan horse</p> Signup and view all the answers

______ replicate themselves and can slow down networks.

<p>worms</p> Signup and view all the answers

______ take control over a device without the user’s knowledge.

<p>Man-In-The-Middle (MitM)</p> Signup and view all the answers

______ is a variation of man-in-the-middle that take control over a mobile device

<p>Man-In-The-Mobile (MitMo)</p> Signup and view all the answers

______ are attached to other executable files.

<p>viruses</p> Signup and view all the answers

Many malware and techniques exist to provide attackers with ______ capabilities.

<p>MitM</p> Signup and view all the answers

An increase in ______ usage can be a symptom of malware infection.

<p>CPU</p> Signup and view all the answers

The ______ can activates at a specific time

<p>Virus</p> Signup and view all the answers

______ are found in image files, audio files or games.

<p>Trojans</p> Signup and view all the answers

Flashcards

Security Vulnerabilities

Software or hardware defects that can be exploited.

Exploit

Program designed to take advantage of a known vulnerability.

Attack

The act of using an exploit against a vulnerability.

Software Vulnerabilities

Usually introduced by errors in operating systems or application code.

Signup and view all the flashcards

SYNful Knock

A significant vulnerability in Cisco IOS that allowed rogue control of routers.

Signup and view all the flashcards

Project Zero

Google's team dedicated to finding software vulnerabilities.

Signup and view all the flashcards

Hardware Vulnerabilities

Introduced by design flaws in hardware.

Signup and view all the flashcards

Rowhammer

An exploit targeting hardware design flaws in RAM.

Signup and view all the flashcards

Buffer Overflow

Occurs when data exceeds the limits of a memory buffer.

Signup and view all the flashcards

Security Research

Field focused on finding and resolving vulnerabilities.

Signup and view all the flashcards

Non-validated input

Input data that can contain malicious content leading to vulnerabilities.

Signup and view all the flashcards

Race conditions

Vulnerability due to improper timing or order of events.

Signup and view all the flashcards

Weaknesses in security practices

Creating custom security algorithms can introduce new vulnerabilities.

Signup and view all the flashcards

Access-control problems

Issues in managing who can access physical resources or data.

Signup and view all the flashcards

Malware

Any malicious software used to steal data or harm systems.

Signup and view all the flashcards

Spyware

Malicious software that gathers information about a user without consent.

Signup and view all the flashcards

Ransomware

Malware that locks a user's data, demanding payment to unlock it.

Signup and view all the flashcards

Scareware

Software that uses fear to trick users into installing malware.

Signup and view all the flashcards

Rootkits

Malicious software that creates a backdoor for unauthorized access.

Signup and view all the flashcards

Bot

Malicious software that waits for commands from an attacker.

Signup and view all the flashcards

Virus

Malware attached to executable files that requires user activation and can spread through various means.

Signup and view all the flashcards

Trojan Horse

Malware disguised as a legitimate file that binds itself to non-executable files.

Signup and view all the flashcards

Worm

Self-replicating malware that spreads quickly across networks and can slow them down.

Signup and view all the flashcards

Man-In-The-Middle (MitM)

An attack where the attacker intercepts communication between two parties to steal information.

Signup and view all the flashcards

Man-In-The-Mobile (MitMo)

A variation of MitM that targets mobile devices to capture sensitive user information.

Signup and view all the flashcards

Malware Symptoms

Signs of malware infection, including high CPU usage, crashes, and unknown files.

Signup and view all the flashcards

Network Slowdown

A decrease in network performance often due to malware activity.

Signup and view all the flashcards

File Modification

Unexplained changes to files often indicating malware presence.

Signup and view all the flashcards

Unwanted Processes

Unknown applications running on a system potentially caused by malware infections.

Signup and view all the flashcards

Study Notes

Chapter 2: Attacks, Concepts, and Techniques

  • This chapter covers security vulnerabilities, exploits, and attacks.
  • Security vulnerabilities are flaws in software or hardware.
  • Malicious users try to exploit vulnerabilities.
  • An exploit is a program designed to take advantage of a known vulnerability.
  • The act of using an exploit is called an attack.

Finding Security Vulnerabilities

  • Security vulnerabilities are defects in software or hardware.
  • Malicious users try to exploit known vulnerabilities.
  • An exploit is a program written to take advantage of a vulnerability.
  • Using an exploit against a vulnerability is an attack.

Software Vulnerabilities

  • Software flaws often lead to vulnerabilities.
  • Operating systems (like Microsoft, Apple) regularly release patches and updates.
  • The SYNful Knock vulnerability in Cisco IOS (2015) allowed attackers to control routers.
  • This vulnerability permitted network monitoring and infection.
  • Updates were needed to address this vulnerability.
  • Maintaining up-to-date software is crucial to avoid exploitation.

Software Vulnerabilities (Continued)

  • The goal of software updates is to patch vulnerabilities.
  • Security researchers identify vulnerabilities and some companies have dedicated teams like Project Zero.
  • Google's Project Zero aims to find software vulnerabilities.

Hardware Vulnerabilities

  • Design flaws in hardware create vulnerabilities.
  • RAM memory's close capacitors create Rowhammer exploit vulnerability.
  • Changes in one capacitor can affect neighboring ones.
  • Hardware vulnerabilities often target specific device models.
  • Hardware exploits are more common in targeted attacks.

Categorizing Security Vulnerabilities: Software

  • Buffer Overflow: Data written beyond buffer limits can lead to system crash or data compromise.
  • Non-validated Input: Malicious input (e.g., images with wrong dimensions) can result in buffer allocation errors.
  • Race Conditions: Output of an event can depend on timing sensitivity, if not executed properly a system is vulnerable.

Categorizing Security Vulnerabilities: Other Issues

  • Weaknesses in security practices: Avoid creating security algorithms. Instead, leverage well-established and tested libraries.
  • Access-Control Problems: Restriction of physical access to systems/equipment is critical to mitigate issues.
  • Encryption techniques are vital.

Types of Malware

  • Malware is malicious software.
  • Malware can steal data, circumvent access controls, or cause harm.
  • Spyware: spies on system activities.
  • Adware: displays advertisements.
  • Bots/Botnets: perform tasks at attacker's command.
  • Ransomware: holds systems hostage until payment is received.
  • Scareware: uses fear tactics to trick users into installing malware.
  • Rootkits: malicious software with a backdoor to system, hides from forensic tools.
  • Viruses: execute attached to files, sometimes harmless, sometime destructive.
  • Trojan Horses: Disguised malware found in games/media.
  • Worms: replicate and spread quickly across networks.
  • Man-in-the-middle (MitM) attacks: intercept communication between two parties.
  • Man-in-the-mobile (MitMo) attacks: similar to MitM but target mobile devices.

Symptoms of Malware

  • Signs of malware include unusual CPU usage, computer slowdowns, freezes, network issues, and file modifications or deletions.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

This quiz covers Chapter 2 on security vulnerabilities, exploits, and attacks. Learn about various software flaws and how malicious users exploit them. Discover the significance of timely updates and patches in maintaining system security.

More Like This

Use Quizgecko on...
Browser
Browser