Podcast
Questions and Answers
What is the primary goal of attackers when using cyber threats?
What is the primary goal of attackers when using cyber threats?
- To enhance system functionality
- To improve network performance
- To infiltrate and steal data (correct)
- To provide security updates
Which of the following actions is an example of an attacker attempting privilege escalation?
Which of the following actions is an example of an attacker attempting privilege escalation?
- Stealing sensitive data of an organization
- Performing unauthorized URL redirection
- Gaining unauthorized access to elevated system rights (correct)
- Remotely altering data in a database server
Which of the following is an example of an unintentional threat source?
Which of the following is an example of an unintentional threat source?
- Hackers
- Foreign intelligence agents
- Terrorists
- Unskilled administrators (correct)
What is a key difference between structured and unstructured external threats?
What is a key difference between structured and unstructured external threats?
What is the primary motive of hacktivists as threat actors?
What is the primary motive of hacktivists as threat actors?
Which attribute primarily distinguishes an insider threat actor from an external one?
Which attribute primarily distinguishes an insider threat actor from an external one?
Which of the following best describes a threat vector?
Which of the following best describes a threat vector?
An attacker injects malicious code into cloud resources to access user data. What type of threat vector is being employed?
An attacker injects malicious code into cloud resources to access user data. What type of threat vector is being employed?
Which malware component is designed to evade antivirus detection by concealing the malware's existence?
Which malware component is designed to evade antivirus detection by concealing the malware's existence?
Which of the listed options is the purpose of 'drive-by downloads' in malware distribution?
Which of the listed options is the purpose of 'drive-by downloads' in malware distribution?
How do attackers primarily use 'spam emails' to distribute malware?
How do attackers primarily use 'spam emails' to distribute malware?
If a computer screen blinks and inverts, webpages open without user input, and the antivirus program is disabled what type of malware could be present?
If a computer screen blinks and inverts, webpages open without user input, and the antivirus program is disabled what type of malware could be present?
What is the distinguishing characteristic of a 'Remote Access Trojan' (RAT)?
What is the distinguishing characteristic of a 'Remote Access Trojan' (RAT)?
A Trojan is installed on a system and is now directing computers to participate in a distributed denial-of-service (DDoS) attack. What classification of Trojan would be responsible for this activity?
A Trojan is installed on a system and is now directing computers to participate in a distributed denial-of-service (DDoS) attack. What classification of Trojan would be responsible for this activity?
Which type of Trojan specifically targets financial data by intercepting account information before it is encrypted by the system?
Which type of Trojan specifically targets financial data by intercepting account information before it is encrypted by the system?
What is the main function of a 'Security Software Disabler Trojan'?
What is the main function of a 'Security Software Disabler Trojan'?
Which of the following is an indication that a computer has been infected with the Emotet Trojan?
Which of the following is an indication that a computer has been infected with the Emotet Trojan?
What is the primary method by which a virus replicates itself?
What is the primary method by which a virus replicates itself?
Which of the following indicates a potential virus attack?
Which of the following indicates a potential virus attack?
In the stages of a virus lifecycle, what action does the 'Launch' stage involve?
In the stages of a virus lifecycle, what action does the 'Launch' stage involve?
Which statement best describes the characteristics of 'Sparse Infector Viruses'?
Which statement best describes the characteristics of 'Sparse Infector Viruses'?
What is the fundamental process of a 'Companion Virus' when it infects a system?
What is the fundamental process of a 'Companion Virus' when it infects a system?
Which of the following describes an armored virus?
Which of the following describes an armored virus?
To create a virus using a batch file the instruction del c:\Windows\*.*
is provided. What result would this command have?
To create a virus using a batch file the instruction del c:\Windows\*.*
is provided. What result would this command have?
Concerning the classification of ransomware, what action characterizes this type of malware?
Concerning the classification of ransomware, what action characterizes this type of malware?
What is a primary distinction between a computer worm and a virus?
What is a primary distinction between a computer worm and a virus?
What is a 'rootkit' primarily designed to do on an infected system?
What is a 'rootkit' primarily designed to do on an infected system?
In the context of rootkits, what does 'exploited by the attackers' describe?
In the context of rootkits, what does 'exploited by the attackers' describe?
What is a common characteristic of Potentially Unwanted Applications (PUAs)?
What is a common characteristic of Potentially Unwanted Applications (PUAs)?
Which of the following is a typical behavior of Adware PUAs?
Which of the following is a typical behavior of Adware PUAs?
What is the main purpose of spyware?
What is the main purpose of spyware?
Keystroke loggers are mainly used for what purpose?
Keystroke loggers are mainly used for what purpose?
What is the purpose of Botnets?
What is the purpose of Botnets?
A type of malware infects legitimate software to perform malicious activities; which malware type is being described?
A type of malware infects legitimate software to perform malicious activities; which malware type is being described?
What is an inherent weakness, relating to network security, that may exist in hardware or software?
What is an inherent weakness, relating to network security, that may exist in hardware or software?
What is the primary result of insecure configurations of hardware or software in a network?
What is the primary result of insecure configurations of hardware or software in a network?
If a firewall is not updated with security features what could occur?
If a firewall is not updated with security features what could occur?
What is a potential impact of vulnerabilities within an organization?
What is a potential impact of vulnerabilities within an organization?
Which is a reason for a careless approach of end users?
Which is a reason for a careless approach of end users?
What key risk is expressed by this formula; Risk = Asset + Threat + Vulnerability?
What key risk is expressed by this formula; Risk = Asset + Threat + Vulnerability?
What factor most directly contributes to system sprawl vulnerability within a network?
What factor most directly contributes to system sprawl vulnerability within a network?
How might a third-party put financial information, customer data, and employee data at risk?
How might a third-party put financial information, customer data, and employee data at risk?
What distinguishes a 'threat' from other cybersecurity terms?
What distinguishes a 'threat' from other cybersecurity terms?
Which of the following scenarios is the BEST example of "an attacker modifying or tampering with the data transferred over a network"?
Which of the following scenarios is the BEST example of "an attacker modifying or tampering with the data transferred over a network"?
What is the MOST likely characteristic of an 'unintentional threat source' within an organization?
What is the MOST likely characteristic of an 'unintentional threat source' within an organization?
Which of the following scenarios highlights a key difference between structured and unstructured external threats?
Which of the following scenarios highlights a key difference between structured and unstructured external threats?
Which action is MOST representative of a cyber terrorist?
Which action is MOST representative of a cyber terrorist?
How does an 'insider threat' primarily gain unauthorized access to sensitive information compared to external threat actors?
How does an 'insider threat' primarily gain unauthorized access to sensitive information compared to external threat actors?
An employee connects a personal USB drive containing malware to their office computer. This scenario BEST exemplifies which threat vector?
An employee connects a personal USB drive containing malware to their office computer. This scenario BEST exemplifies which threat vector?
What is the MOST likely outcome when an attacker injects malicious code into a cloud-based service implementation module?
What is the MOST likely outcome when an attacker injects malicious code into a cloud-based service implementation module?
What type of malware focuses primarily on concealing its existence to evade detection?
What type of malware focuses primarily on concealing its existence to evade detection?
An attacker uses 'black hat SEO' techniques to trick users into clicking on malicious links in search engine results. What is the PRIMARY goal?
An attacker uses 'black hat SEO' techniques to trick users into clicking on malicious links in search engine results. What is the PRIMARY goal?
What action is MOST crucial that a user must perform for malware distributed through spam emails to compromise their system?
What action is MOST crucial that a user must perform for malware distributed through spam emails to compromise their system?
A user reports the following: computer screen blinks and inverts, webpages open without user input and strange pop-ups suddenly appear. Additionally, the antivirus program has been disabled. Which type of malware is MOST likely present?
A user reports the following: computer screen blinks and inverts, webpages open without user input and strange pop-ups suddenly appear. Additionally, the antivirus program has been disabled. Which type of malware is MOST likely present?
Which capability BEST distinguishes a Remote Access Trojan (RAT) from other types of malware?
Which capability BEST distinguishes a Remote Access Trojan (RAT) from other types of malware?
What is the PRIMARY function of a Botnet Trojan after it infects a system?
What is the PRIMARY function of a Botnet Trojan after it infects a system?
What characteristic is MOST unique to E-Banking Trojans compared to other types of Trojans?
What characteristic is MOST unique to E-Banking Trojans compared to other types of Trojans?
What distinguishes a Security Software Disabler Trojan from other types of malware?
What distinguishes a Security Software Disabler Trojan from other types of malware?
A user receives an email with a malicious Word document attached. Upon opening, the document prompts the user to "Enable Content" to view it properly. If the user enables content, which Trojan might be installed?
A user receives an email with a malicious Word document attached. Upon opening, the document prompts the user to "Enable Content" to view it properly. If the user enables content, which Trojan might be installed?
What is the defining characteristic of how a virus spreads from one computer to another?
What is the defining characteristic of how a virus spreads from one computer to another?
What is the MOST direct indication that a computer might be infected with a virus?
What is the MOST direct indication that a computer might be infected with a virus?
In the 'Launch' stage of a virus lifecycle, what action MOST accurately describes the virus's activity?
In the 'Launch' stage of a virus lifecycle, what action MOST accurately describes the virus's activity?
What is a key characteristic of Sparse Infector Viruses' infection strategy?
What is a key characteristic of Sparse Infector Viruses' infection strategy?
How does a Companion Virus primarily achieve its infection?
How does a Companion Virus primarily achieve its infection?
What is the MOST significant feature of an 'armored' virus?
What is the MOST significant feature of an 'armored' virus?
A malicious batch file contains the instruction @echo off
then del c:\Windows\*.*
. What specific action would this batch file MOST likely perform?
A malicious batch file contains the instruction @echo off
then del c:\Windows\*.*
. What specific action would this batch file MOST likely perform?
What action defines the operational purpose of ransomware?
What action defines the operational purpose of ransomware?
What is the PRIMARY difference in how a computer worm spreads compared to a computer virus?
What is the PRIMARY difference in how a computer worm spreads compared to a computer virus?
What is the defining purpose of a rootkit on an infected system?
What is the defining purpose of a rootkit on an infected system?
The phrase "exploited by the attackers" in the context of describing rootkits indicates which state?
The phrase "exploited by the attackers" in the context of describing rootkits indicates which state?
What is a common trait exhibited by Potentially Unwanted Applications (PUAs)?
What is a common trait exhibited by Potentially Unwanted Applications (PUAs)?
What is a typical behavior pattern of Adware PUAs?
What is a typical behavior pattern of Adware PUAs?
What is the PRIMARY goal of spyware?
What is the PRIMARY goal of spyware?
Why are keystroke loggers primarily used?
Why are keystroke loggers primarily used?
What is the PRIMARY use of Botnets?
What is the PRIMARY use of Botnets?
Malware has infected legitimate software to perform malicious activities. Which is being described?
Malware has infected legitimate software to perform malicious activities. Which is being described?
What constitutes an inherent weakness as it pertains to network security?
What constitutes an inherent weakness as it pertains to network security?
Insecure configuration of hardware or software in a network primarily leads to what outcome?
Insecure configuration of hardware or software in a network primarily leads to what outcome?
What is the primary effect of not keeping a firewall’s security features up to date?
What is the primary effect of not keeping a firewall’s security features up to date?
What is the MOST significant potential impact of unaddressed vulnerabilities within an organization?
What is the MOST significant potential impact of unaddressed vulnerabilities within an organization?
Why might a careless approach by end users increase security risks?
Why might a careless approach by end users increase security risks?
What elements are combined to define risk in the formula: Risk = Asset + Threat + Vulnerability?
What elements are combined to define risk in the formula: Risk = Asset + Threat + Vulnerability?
What aspect MOST directly contributes to system sprawl vulnerability within a network?
What aspect MOST directly contributes to system sprawl vulnerability within a network?
What is the MOST likely compromise that a third-party puts company information at risk?
What is the MOST likely compromise that a third-party puts company information at risk?
How do natural threats primarily impact an organization's assets?
How do natural threats primarily impact an organization's assets?
What is a defining characteristic of intentional insider threats?
What is a defining characteristic of intentional insider threats?
Which type of external threat actor is MOST likely to simultaneously execute attacks from multiple sources, such as distributed ICMP floods?
Which type of external threat actor is MOST likely to simultaneously execute attacks from multiple sources, such as distributed ICMP floods?
How do 'gray hat' hackers typically operate?
How do 'gray hat' hackers typically operate?
Which motivation aligns with 'cyber terrorists' as threat actors?
Which motivation aligns with 'cyber terrorists' as threat actors?
What is the main objective of 'industrial spies' as threat actors?
What is the main objective of 'industrial spies' as threat actors?
How do attackers primarily use 'removable media' as a threat vector?
How do attackers primarily use 'removable media' as a threat vector?
In what way does a 'supply chain' act as a threat vector?
In what way does a 'supply chain' act as a threat vector?
What is the initial action performed by malware designed to 'attack browsers and track websites visited'?
What is the initial action performed by malware designed to 'attack browsers and track websites visited'?
Which of the following techniques involves 'tricking users into clicking on innocent-looking webpages'?
Which of the following techniques involves 'tricking users into clicking on innocent-looking webpages'?
What describes a crypter in the context of malware components?
What describes a crypter in the context of malware components?
What is the function of an 'Obfuscator' in malware?
What is the function of an 'Obfuscator' in malware?
What is a 'Destructive Trojan' designed to do on an infected system?
What is a 'Destructive Trojan' designed to do on an infected system?
If a system displays a computer message directed at the user, asking them questions requiring a 'yes', 'no', or 'ok' click response, what type of malware might be present?
If a system displays a computer message directed at the user, asking them questions requiring a 'yes', 'no', or 'ok' click response, what type of malware might be present?
Why are 'Sparse Infector Viruses' more difficult to detect compared to other types of viruses?
Why are 'Sparse Infector Viruses' more difficult to detect compared to other types of viruses?
How does a 'Companion Virus' primarily achieve infection?
How does a 'Companion Virus' primarily achieve infection?
Why is identifying and removing 'LoJax' rootkit particularly challenging?
Why is identifying and removing 'LoJax' rootkit particularly challenging?
What is the primary risk associated with Potentially Unwanted Applications (PUAs) classified as “Dialers”?
What is the primary risk associated with Potentially Unwanted Applications (PUAs) classified as “Dialers”?
How does a 'fileless malware infection' commonly propagate?
How does a 'fileless malware infection' commonly propagate?
What is a key factor that leads to 'system sprawl vulnerability' within a network?
What is a key factor that leads to 'system sprawl vulnerability' within a network?
Flashcards
What is a Threat?
What is a Threat?
A potential event that can damage or disrupt an organization's activities.
Examples of Threats
Examples of Threats
Stealing sensitive data, causing server shutdowns, tricking employees, or infecting systems with malware.
Threat Sources
Threat Sources
Natural, unintentional, and intentional occurrences.
Black Hats
Black Hats
Signup and view all the flashcards
White Hats
White Hats
Signup and view all the flashcards
Gray Hats
Gray Hats
Signup and view all the flashcards
Suicide Hackers
Suicide Hackers
Signup and view all the flashcards
Script Kiddies
Script Kiddies
Signup and view all the flashcards
Threat Vector Definition
Threat Vector Definition
Signup and view all the flashcards
Threat Vectors
Threat Vectors
Signup and view all the flashcards
Introduction to Malware
Introduction to Malware
Signup and view all the flashcards
Malware Intentions
Malware Intentions
Signup and view all the flashcards
Malware Entry Points
Malware Entry Points
Signup and view all the flashcards
Crypter Definition
Crypter Definition
Signup and view all the flashcards
Downloader Definition
Downloader Definition
Signup and view all the flashcards
Dropper Definition
Dropper Definition
Signup and view all the flashcards
Exploit Definition
Exploit Definition
Signup and view all the flashcards
Injector
Injector
Signup and view all the flashcards
Obfuscator
Obfuscator
Signup and view all the flashcards
Packer
Packer
Signup and view all the flashcards
Payload
Payload
Signup and view all the flashcards
Types of Malware
Types of Malware
Signup and view all the flashcards
What is a Trojan?
What is a Trojan?
Signup and view all the flashcards
Trojan Symptoms
Trojan Symptoms
Signup and view all the flashcards
How Hackers Use Trojans
How Hackers Use Trojans
Signup and view all the flashcards
Ransomware
Ransomware
Signup and view all the flashcards
Computer Worms
Computer Worms
Signup and view all the flashcards
Why Attackers Use Botnets?
Why Attackers Use Botnets?
Signup and view all the flashcards
Fileless Malware
Fileless Malware
Signup and view all the flashcards
What is Vulnerability?
What is Vulnerability?
Signup and view all the flashcards
Existence of vulnerabilities comes from?
Existence of vulnerabilities comes from?
Signup and view all the flashcards
Impact Caused Due to Vulnerabilities. Result in..
Impact Caused Due to Vulnerabilities. Result in..
Signup and view all the flashcards
Risk!
Risk!
Signup and view all the flashcards
Examples of Risks
Examples of Risks
Signup and view all the flashcards
Vulnerability Classifications
Vulnerability Classifications
Signup and view all the flashcards
Weak Configurations
Weak Configurations
Signup and view all the flashcards
Default Password
Default Password
Signup and view all the flashcards
Study Notes
Threats
- A threat is a possible undesirable event that could eventually damage and/or disrupt an organization's operations and functions
- Cyber threats are used by attackers to infiltrate systems and steal data like individuals' personal, financial, and login information
Examples of Threats
- Stealing sensitive data
- Causing server shutdowns
- Tricking employees into revealing sensitive information
- Infecting systems with malware
- Spoofing identities to gain unauthorized access
- Modifying data transfers
- Remotely altering database servers
- Performing URL redirection/forwarding
- Escalating privileges for unauthorized access
- Executing denial-of-service attacks
- Eavesdropping on unauthorized communications
Threat Sources
- Unintentional threats are due to potential unintentional errors, including insider security breaches, negligence, operator errors, unskilled administrators, and accidents
- Intentional threats consist of two sources: internal and external
Natural Threats
- Fires, floods, power failures, lightning, meteors, and earthquakes are all Natural threats
- These may cause severe physical damage to computer systems.
Intentional Threats
- Most computer and Internet-related crimes are internal attacks that are carried out of disgruntled employees that can harm the organization intentionally or unintentionally
- These attacks are usually performed by privileged users
- Structured external threats are initiated by skilled attackers to use tools in order to gain access to a network with the aim of disrupting services. Motivations include criminal bribes, racism, politics, terrorism, etc.
- Examples: Distributed ICMP floods and spoofing
- Unstructured external threats are executed by unskilled attackers, often script kiddies to access networks, most of the time out of curiosity instead of criminal intentions
- Examples: Using online tools to launch a network attack or crashing a website
- Unstructured external threats are able to be prevented with security solutions
Threat Actors/Agents
- Black Hats use computing skills for illegal activities. They are also known as crackers.
- White Hats, or penetration testers, use hacking skills for defensive purposes with permission from the system owner.
- Gray Hats work both offensively and defensively. They may assist hackers and help vendors improve product security.
- Suicide Hackers aim to disrupt critical infrastructure for a "cause" and are not deterred by potential punishments.
- Script Kiddies are unskilled hackers who use tools developed by others
- They lack specific targets and aim to gain popularity or prove skills
Other Threat Actors/Agents
- Cyber Terrorists disrupt computer networks with wide range of skills, motivated by religious or political beliefs
- State-Sponsored Hackers penetrate and damage other governments' information systems with expertise in hacking while working for the government
- Industrial Spies perform corporate espionage by illegally spying on competitors to steal critical information
- Insider Threats misuse their trusted access to critical data and resources and can bypass the security rules
- Hacker Teams work together and detect vulnerabilities while researching in order to develop advanced tools, and execute attacks with proper planning
- Criminal Syndicates embezzle money and exploit victims from distinct jurisdictions with the aim of illegally embezzling money by performing sophisticated cyber-attacks and money-laundering
- Hacktivist break into computer systems as an act of protest, to deface/disable websites to promote a political agenda.
Attributes of Threat Actors
- Internal threat actiors are entrusted insiders who have permission and authorized access to organization's network.
- External threat actors are the outsiders who do not have any authorized acess
- How sophisticated the attack is
- How motivated the threat actor in launching the the attack
Threat Vectors
- A medium through which an attacker gains access to system where identified vulnerabilities can be exploited
- Gaining physical access to the target system and performing malicious activities
- Devices which might contain malware that run automatically on the host system to steal or corrupt critical files
- Implementing an unsecured wireless hotspot or using cracking/spoofing tools to gain access
- Using Email for phishing attacks such as clicking on malicious links with malicious attachments.
- Injecting malware into cloud resources to gain access to user information
- Unpatched vulnerablilities that inject ransomware.
- Compromising the target by exploiting vulnerabilities in the resources supplied by a third-party vendor.
- Using supply chain attacks to gain access to the customers' information of third party organizations
Mitigation: Autorun.inf
- Here is how to mitigate such infection
- Turn off the Autostart functionality with the following content of an Autorun.inf file:
- [autorun]
- open=setup.exe To mitigate such infection, turn off the Autostart functionality. Follow the instructions below to turn off Autoplay in Windows 10::
- Click Start. Type gpedit.msc in the Start Search box, and then press ENTER.
- If you are prompted for an administrator password or confirmation, type the password, or click Allow.
- Under Computer Configuration, expand Administrative Templates, expand Windows Components, and then click Autoplay Policies.
- In the Details pane, double-click Turn off Autoplay.
- Click Enabled, and then select All drives in the Turn off Autoplay box to disable Autorun on all drives.
- Restart the computer.
Components of Malware:
- Crypter eludes antivirus detection and protects malware from reverse engineering or analysis
- Downloader downloads other malware (or) malicious code and files from the Internet to a PC or device
- Dropper is a covert carrier of malware that perform the installation task covertly can transport malware code and execute malware on a target system without being detected by antivirus scanners.
- Exploit breaches the system’s security through software vulnerabilities
- Injector injects exploits or malicious code available in the malware into other vulnerable running processes and changes the method of execution to hide or prevent its removal
- Obfuscator conceals the malicious code of malware via various techniques
- Packer compresses the malware file to convert the code and data of the malware into an unreadable format
- Payload performs the desired activity when activated such as deleting, modifying files, degrading the system performance, opening ports, changing settings, etc.
- Malicious code defines the basic functionality of the malware such as Java Applets or Browser Plug-ins
Common Techniques Attakers use to Distribute Malware on the Web:
- Black hat SEO (unethical SEO) uses aggressive SEO to get higher search engine rankings for malware pages
- Social Engineered Click-jacking injects malware into website, it triggers the knowledge before the user clicks.
- Spear-phishing mimics sites by mimicing legitimate institutions.
- Malvertising embeds malwares.
- Drive by Downloads exploits flaws in browser software by installation malware.
- Compromised Leginimate Websites use websites to infect with malicious activities.
- Spam Emails attaches malicious files to email in order to trick users into executing them
Types of Trojans
- Remote Access Trojans (RATs) provide attackers with full control over the victim's system
- Backdoor Trojans bypass the standard system protocol
- They trick regular computer users into downloading Trojan-infected files to their systems through phishing, SEO hacking, URL redirection
- Rootkit Trojans attack the root or OS and have full victim control to the OS
- E-banking Trojans are extremely dangerous and steal monetary amounts, also install a malicious advertisement
- Point of Sale Trojans obtain sensitive information.
- Defacement Trojans change the entire continent of the databse
- Mobile Trojans attack phones through banking and social networking credential stealing
- Io T Trojans attack Io T networks Security Software Disabler Trojans are entry Trojans that allow an attacker to perform the next level of attack on the target system.
- Destructive Trojans delete files on a target system
- DDos Attack Trojans perform DDoS attacks on target machines, networks, or web addresses
- Command Shell Trojans provide remote control of command shell
Indicators of a Trojan
- The DVD-ROM drawer opens and closes automatically.
- The computer screen blinks, flips upside-down, or is inverted .
- Pop-ups with bizarre messages suddenly appear.
- Strange warnings or question boxes appear.
- The Task Manager is disabled.
- The default background or wallpaper settings change automatically.
Types of Creating a Virus
- The virus can be created with these tools:
- Writing a Virus Program
- Using Virus Maker Tools
Types of Viruses
- System or Boot Sector infects boot record sector (MBR)
- File Viruses infects COM, EXE, SYS,
- Multipartite Virus combines both approaches to a infection, the boot sector and the executable or program files
- Macro Virus infects Microsoft Word or similar applications by automatically a sequence of action.
- Cluster Virus infects files without changing the file or planting additional files
- Stealth/Tunneling Virus These viruses try to hide from antivirus programs by actively altering and corrupting the service call interrupts while running.
Types of Using Using Virus Maker Tools
- To customize and craft your virus into a single executable file it have to perform these task:
- Disable Windows command prompt and Windows Task Manager
- Shut down the system
- Infect all executable files Inject itself into the Windows registry and start up with Windows -Perform non-malicious activity such as unusual mouse and keyboard actions
Malware: Ransomware
- A type of malware that restrict access to the computer system's files and demand an online ransom money for it
Characteristics of Worms
- Malicious programs replicate, execute, and spreads across network connections independently.
- Consume bandwidth without human interaction
- Attackers use worm payloads to install backdoors in infected computer
Examples of Potential Ransomware
- eCh0raix, SamSam,WannaCry, Petya, GandCrab,MegaCortex,LockerGoga,NamPoHyu,Ryuk,Cryptghost;
How is a Worm Different From a Virus?
- A worm does not attack itself to another programs in a system or computer
- Worms attacks through file or other transports
- A worms replicate but its speed is not uniformed
How to spot an Adware
- Frequent system log with a system crash displays the blue screen
- Homepage changes unexpectedly and redirects to malicious pages
Types of unwanted Applications
- Adware display unsolicited advertisements
- Torrent application with a peer sharing.
Types of what and why:
- Viruses and worms
- Trojans and how the code and system functions
Popular Rootkits
- LoJax is the name of the system and what it does
- Popularities of the UEF
Areas of Vulnerability
- Users : Intentional or unintentional human errors
- Operating System : bugs in the operating system The applications themselves
- Network Devices : Failing to change default settings
- Network Infrastructure
- Io T
- Configuration Files
Impact Caused Due to Vulneratilities
- A website or application and information disclosure, denial of service, privilege, identity, access
- Loss reputation and damages
Types of Vulnerabilities
These items are a combination of Misconfigurations, Weak, Application, Design, Default and Operating System
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.