Podcast
Questions and Answers
What is the primary goal of a Teardrop Attack?
What is the primary goal of a Teardrop Attack?
What does the hacker send to the victim system in a Teardrop Attack?
What does the hacker send to the victim system in a Teardrop Attack?
What happens to the victim system when it attempts to reconstruct the fragmented message?
What happens to the victim system when it attempts to reconstruct the fragmented message?
What is the nature of the vulnerability exploited in a Teardrop Attack?
What is the nature of the vulnerability exploited in a Teardrop Attack?
Signup and view all the answers
What type of attack is a Teardrop Attack classified as?
What type of attack is a Teardrop Attack classified as?
Signup and view all the answers
What is a characteristic of spyware?
What is a characteristic of spyware?
Signup and view all the answers
What is an example of a form of spyware?
What is an example of a form of spyware?
Signup and view all the answers
What is a legal use of spyware?
What is a legal use of spyware?
Signup and view all the answers
What is a characteristic of rootkits?
What is a characteristic of rootkits?
Signup and view all the answers
What is a characteristic of malicious web-based code?
What is a characteristic of malicious web-based code?
Signup and view all the answers
How do antivirus software operate?
How do antivirus software operate?
Signup and view all the answers
What is an example of anti-spyware software?
What is an example of anti-spyware software?
Signup and view all the answers
What is the purpose of keeping the signature file updated in antivirus software?
What is the purpose of keeping the signature file updated in antivirus software?
Signup and view all the answers
What is a common way to avoid getting infected by viruses?
What is a common way to avoid getting infected by viruses?
Signup and view all the answers
What can a Trojan horse do to a system?
What can a Trojan horse do to a system?
Signup and view all the answers
What is the result of a buffer overflow attack?
What is the result of a buffer overflow attack?
Signup and view all the answers
Why should company policy prohibit unauthorized downloads?
Why should company policy prohibit unauthorized downloads?
Signup and view all the answers
What is a characteristic of a competent programmer who crafts a Trojan horse?
What is a characteristic of a competent programmer who crafts a Trojan horse?
Signup and view all the answers
What is the purpose of a code word for safe attachments from friends?
What is the purpose of a code word for safe attachments from friends?
Signup and view all the answers
What can a virus do to a system?
What can a virus do to a system?
Signup and view all the answers
What is the result of writing data beyond the allocated end of a buffer?
What is the result of writing data beyond the allocated end of a buffer?
Signup and view all the answers
What is a characteristic of a computer virus?
What is a characteristic of a computer virus?
Signup and view all the answers
How do viruses typically spread through a network?
How do viruses typically spread through a network?
Signup and view all the answers
What is a common method of virus propagation through email?
What is a common method of virus propagation through email?
Signup and view all the answers
Why is Microsoft Outlook a popular target for viruses?
Why is Microsoft Outlook a popular target for viruses?
Signup and view all the answers
What is a type of malware that disguises itself as a legitimate program?
What is a type of malware that disguises itself as a legitimate program?
Signup and view all the answers
What is a buffer overflow attack?
What is a buffer overflow attack?
Signup and view all the answers
What is spyware?
What is spyware?
Signup and view all the answers
What is the primary goal of defending against malware attacks?
What is the primary goal of defending against malware attacks?
Signup and view all the answers
Study Notes
Malware
- Malware requires more technical knowledge and is usually used for targets of choice.
- It must be tailored to specific circumstances and deployed.
Spyware
- Forms of spyware include web cookies and key loggers.
- Legal uses of spyware include monitoring children's computer use and employee monitoring.
- Illegal uses of spyware involve covert deployment.
- There are free spyware removal software available.
Other Forms of Malware
- Rootkit is a collection of hacking tools that can:
- Monitor traffic and keystrokes
- Create a backdoor
- Alter log files and existing tools to avoid detection
- Attack other machines on the network
Malicious Web-Based Code
- Web-based mobile code is portable on all operating systems and can spread quickly on the web.
- Poorly scripted code can result in vulnerabilities.
Detecting and Eliminating Viruses and Spyware
- Antivirus software operates in two ways:
- Scans for virus signatures and keeps the signature file updated
- Watches the behavior of executables, such as attempts to access email address book or change registry settings
- Anti-spyware software is available from websites like webroot.com, spykiller.com, zerospy.com, and spectorsoft.com
Viruses
- A computer virus self-replicates and spreads rapidly, and may or may not have a malicious payload.
- Viruses can spread through:
- Network connections
- Email, using Microsoft Outlook or other email engines
- Web site delivery, relying on end-user negligence
- Multiple vectors for a virus are becoming more common.
- Rules for avoiding viruses include:
- Using a virus scanner
- Not opening questionable attachments
- Using a code word for safe attachments from friends
- Not believing "Security Alerts"
Trojan Horses
- A Trojan horse is a program that looks benign but is not, and can:
- Download harmful software
- Install a key logger
- Open a back door for hackers
- Company policy should prohibit unauthorized downloads.
The Buffer Overflow Attack
- A buffer overflow attack occurs when a program writes data beyond the allocated end of a buffer, causing valid data to be overwritten.
- This can cause execution of arbitrary (and potentially malicious) code.
- A buffer overflow attack can be prevented by using security patches and keeping software up-to-date.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Learn about the teardrop attack, a type of denial-of-service attack where a hacker sends fragmented messages to a victim system, causing it to crash or halt. Understand how this attack works and its effects on computer systems.