Podcast
Questions and Answers
Which of the following is the primary function of spyware?
Which of the following is the primary function of spyware?
- Delivering unwanted advertisements to the user's browser.
- Gaining unauthorized access to a system by bypassing authentication.
- Monitoring online activity and capturing sensitive data. (correct)
- Encrypting user data and demanding a ransom for its release.
Adware always operates independently and never comes bundled with other forms of malware.
Adware always operates independently and never comes bundled with other forms of malware.
False (B)
What type of malware bypasses normal authentication procedures to gain unauthorized access to a system?
What type of malware bypasses normal authentication procedures to gain unauthorized access to a system?
Backdoor
_________ is a type of malware designed to hold a computer system or the data it contains captive until a payment is made.
_________ is a type of malware designed to hold a computer system or the data it contains captive until a payment is made.
What is the main tactic employed by scareware to trick users?
What is the main tactic employed by scareware to trick users?
A rootkit primarily aims to deliver advertisements to the user's web browser.
A rootkit primarily aims to deliver advertisements to the user's web browser.
What is the defining characteristic of a virus that differentiates it from other types of malware?
What is the defining characteristic of a virus that differentiates it from other types of malware?
A ___________ carries out malicious operations by masking its true intent and often exploits user privileges.
A ___________ carries out malicious operations by masking its true intent and often exploits user privileges.
Which of the following characteristics primarily distinguishes a worm from a virus?
Which of the following characteristics primarily distinguishes a worm from a virus?
Increased CPU usage and slower device performance are not indicative of a malware infection.
Increased CPU usage and slower device performance are not indicative of a malware infection.
Name two common symptoms that might indicate a system is infected with malware.
Name two common symptoms that might indicate a system is infected with malware.
In a social engineering attack, _________ involves an attacker calling an individual and lying to them in an attempt to gain access to privileged data.
In a social engineering attack, _________ involves an attacker calling an individual and lying to them in an attempt to gain access to privileged data.
Which social engineering tactic involves an attacker quickly following an authorized person into a secure location?
Which social engineering tactic involves an attacker quickly following an authorized person into a secure location?
Denial-of-Service DoS attacks always require sophisticated hacking skills and are difficult to carry out
Denial-of-Service DoS attacks always require sophisticated hacking skills and are difficult to carry out
What is the primary goal of a Denial-of-Service (DoS) attack?
What is the primary goal of a Denial-of-Service (DoS) attack?
A ___________ occurs when a network, host, or application is sent an overwhelming amount of data that it cannot handle, causing it to crash.
A ___________ occurs when a network, host, or application is sent an overwhelming amount of data that it cannot handle, causing it to crash.
What is the key difference between a DoS attack and a DDoS attack?
What is the key difference between a DoS attack and a DDoS attack?
In a botnet, infected hosts called 'zombies' are controlled by antivirus software to neutralize threats.
In a botnet, infected hosts called 'zombies' are controlled by antivirus software to neutralize threats.
What are infected computers in a botnet commonly called?
What are infected computers in a botnet commonly called?
A __________ is a group of bots connected through the Internet, often controlled through a command-and-control server.
A __________ is a group of bots connected through the Internet, often controlled through a command-and-control server.
What is the primary purpose of an On-Path attack also known as 'man-in-the-middle'?
What is the primary purpose of an On-Path attack also known as 'man-in-the-middle'?
In a Man-In-The-Middle MITM attack, the attacker always requires physical access to the targeted devices.
In a Man-In-The-Middle MITM attack, the attacker always requires physical access to the targeted devices.
What type of attack involves taking control over a user's mobile device to exfiltrate sensitive information?
What type of attack involves taking control over a user's mobile device to exfiltrate sensitive information?
__________ is a technique where attackers use search engine optimization to push malicious sites higher in search results.
__________ is a technique where attackers use search engine optimization to push malicious sites higher in search results.
What is the most common goal of SEO poisoning attacks?
What is the most common goal of SEO poisoning attacks?
Password spraying involves trying a large number of passwords against a single user account.
Password spraying involves trying a large number of passwords against a single user account.
What is the primary goal of password spraying?
What is the primary goal of password spraying?
A __________ attack systematically tries every word in a dictionary as a password to gain unauthorized access.
A __________ attack systematically tries every word in a dictionary as a password to gain unauthorized access.
In what form are passwords stored in a computer system?
In what form are passwords stored in a computer system?
Unlike brute-force attacks, rainbow attacks calculate each hash in real-time to find a password match.
Unlike brute-force attacks, rainbow attacks calculate each hash in real-time to find a password match.
What is a primary risk of storing passwords in clear, readable text?
What is a primary risk of storing passwords in clear, readable text?
___________ involve multi-phase, long-term, stealthy, and advanced operations against a specific target.
___________ involve multi-phase, long-term, stealthy, and advanced operations against a specific target.
Which of the following is a typical characteristic of Advanced Persistent Threats APTs?
Which of the following is a typical characteristic of Advanced Persistent Threats APTs?
Exploits refer specifically to hardware defects and not software vulnerabilities.
Exploits refer specifically to hardware defects and not software vulnerabilities.
What is the general term for any kind of software or hardware defect that can be exploited?
What is the general term for any kind of software or hardware defect that can be exploited?
________ is a hardware exploit that involves repeatedly accessing a row of memory to cause electrical interferences and data corruption.
________ is a hardware exploit that involves repeatedly accessing a row of memory to cause electrical interferences and data corruption.
What type of attack gained through the Meltdown and Spectre hardware vulnerabilities?
What type of attack gained through the Meltdown and Spectre hardware vulnerabilities?
Hardware vulnerabilities are generally exploited through random compromising attempts, making them common in everyday malware attacks.
Hardware vulnerabilities are generally exploited through random compromising attempts, making them common in everyday malware attacks.
What must you always verify the integrity of to avoid the SYNful knock vulnerability?
What must you always verify the integrity of to avoid the SYNful knock vulnerability?
A _______ overflow vulnerability occurs when data is written beyond the limits of a buffer, potentially allowing access to memory allocated to other processes.
A _______ overflow vulnerability occurs when data is written beyond the limits of a buffer, potentially allowing access to memory allocated to other processes.
Match the following attack types with thier descriptions.
Match the following attack types with thier descriptions.
What is the main goal of software updates?
What is the main goal of software updates?
Which type of malware is designed to automatically display advertisements to a user, often within a web browser?
Which type of malware is designed to automatically display advertisements to a user, often within a web browser?
A worm requires user interaction to spread from one computer to another, similar to a virus.
A worm requires user interaction to spread from one computer to another, similar to a virus.
What is the primary goal of SEO poisoning?
What is the primary goal of SEO poisoning?
A __________ attack occurs when a cybercriminal intercepts communication between two devices to steal information.
A __________ attack occurs when a cybercriminal intercepts communication between two devices to steal information.
Match the following social engineering techniques with their descriptions:
Match the following social engineering techniques with their descriptions:
Flashcards
What is Malware?
What is Malware?
Malware is any code used to steal data, bypass access controls, or compromise a system.
What is Spyware?
What is Spyware?
Spyware monitors online activity, logs keystrokes, and captures data, including sensitive info.
What is Adware?
What is Adware?
Adware delivers unwanted ads, often via web browsers, and may include spyware.
What is a Backdoor?
What is a Backdoor?
Signup and view all the flashcards
What is Ransomware?
What is Ransomware?
Signup and view all the flashcards
What is Scareware?
What is Scareware?
Signup and view all the flashcards
What is a Rootkit?
What is a Rootkit?
Signup and view all the flashcards
What is a Virus?
What is a Virus?
Signup and view all the flashcards
What is a Trojan Horse?
What is a Trojan Horse?
Signup and view all the flashcards
What is a Worm?
What is a Worm?
Signup and view all the flashcards
Symptoms of Malware?
Symptoms of Malware?
Signup and view all the flashcards
What is Social Engineering?
What is Social Engineering?
Signup and view all the flashcards
What is Pretexting?
What is Pretexting?
Signup and view all the flashcards
What is Tailgating?
What is Tailgating?
Signup and view all the flashcards
What is Quid Pro Quo?
What is Quid Pro Quo?
Signup and view all the flashcards
What is a DoS Attack?
What is a DoS Attack?
Signup and view all the flashcards
Overwhelming Quantity of Traffic
Overwhelming Quantity of Traffic
Signup and view all the flashcards
Maliciously Formatted Packets
Maliciously Formatted Packets
Signup and view all the flashcards
What is a DDoS Attack?
What is a DDoS Attack?
Signup and view all the flashcards
What is a Botnet?
What is a Botnet?
Signup and view all the flashcards
What is a Man-in-the-Middle (MITM) attack?
What is a Man-in-the-Middle (MITM) attack?
Signup and view all the flashcards
What is a MAN-IN-THE-MOBILE (MITMO) attack?
What is a MAN-IN-THE-MOBILE (MITMO) attack?
Signup and view all the flashcards
What is SEO Poisoning?
What is SEO Poisoning?
Signup and view all the flashcards
What is Password Spraying?
What is Password Spraying?
Signup and view all the flashcards
What is a Dictionary Attack?
What is a Dictionary Attack?
Signup and view all the flashcards
What are Brute-Force Attacks?
What are Brute-Force Attacks?
Signup and view all the flashcards
What are Rainbow Attacks?
What are Rainbow Attacks?
Signup and view all the flashcards
What is Traffic Interception?
What is Traffic Interception?
Signup and view all the flashcards
What are Advanced Persistent Threats (APTs)?
What are Advanced Persistent Threats (APTs)?
Signup and view all the flashcards
Security Vulnerabilities and Exploits?
Security Vulnerabilities and Exploits?
Signup and view all the flashcards
What is are Rowhammer exploits?
What is are Rowhammer exploits?
Signup and view all the flashcards
What are Meltdown and Spectre?
What are Meltdown and Spectre?
Signup and view all the flashcards
What is SYNful Knock?
What is SYNful Knock?
Signup and view all the flashcards
What is Buffer Overflow?
What is Buffer Overflow?
Signup and view all the flashcards
What is Non-Validated Input?
What is Non-Validated Input?
Signup and view all the flashcards
What are Race conditions?
What are Race conditions?
Signup and view all the flashcards
What is Weakness in security Policies?
What is Weakness in security Policies?
Signup and view all the flashcards
What are Access control problems?
What are Access control problems?
Signup and view all the flashcards
Why Update Software?
Why Update Software?
Signup and view all the flashcards
What is Cryptocurrency?
What is Cryptocurrency?
Signup and view all the flashcards
What is Crypto jacking?
What is Crypto jacking?
Signup and view all the flashcards
Study Notes
Types of Malware
- Cybercriminals use diverse malware to perform malicious actions.
- Malware includes any code used to steal data, bypass access controls, compromise systems or cause harm.
- Understanding malware types and how they spread is crucial for containment and removal.
Spyware
- Spyware tracks online activity and logs keystrokes to capture various data, including sensitive information.
- It modifies device security settings and often bundles with legitimate software or Trojan horses.
Adware
- Adware automatically delivers advertisements to users, often through web browsers.
- It commonly comes with spyware.
Backdoor
- Backdoor malware bypasses authentication procedures for unauthorized system access.
- Hackers can remotely access resources and issue system commands.
- Backdoors operate in the background and are hard to detect.
Ransomware
- Ransomware holds a computer system or data captive until a payment is made, usually by encrypting the data.
- It can exploit system vulnerabilities and is spread via phishing emails or software vulnerabilities.
Scareware
- Scareware tricks users into specific actions using 'scare' tactics.
- It uses operating system-style pop-up windows to warn of system risks and prompts the use of a specific program.
- Executing the prompted program infects the system.
Rootkit
- Rootkits modify the operating system to create backdoors for remote access.
- They exploit vulnerabilities for privilege escalation and modify system files.
- Rootkits modify system forensics and monitoring tools, making them hard to detect and often requiring a complete system wipe and software reinstall.
Virus
- Viruses replicate and attach to executable files by inserting their code.
- They need user interaction to activate and can be programmed to act on a specific date or time.
- Viruses can vary from harmless to destructive, modifying or deleting data.
- They can also mutate to evade detection and spread through USB drives, optical disks, network shares, or email.
Trojan Horse
- Trojan horses perform malicious operations while disguised as legitimate software.
- Unlike viruses, they don't self-replicate but trick users into installing malicious software.
- Commonly found in image, audio, or game files and exploits user privileges
Worms
- Worms replicate to spread from one computer to another.
- They do not require a host program or user participation, and spread quickly over networks.
- They exploit system vulnerabilities, propagate themselves, and carry malicious code (payloads) to damage systems or networks.
- In 2001, the Code Red worm infected over 300,000 servers in 19 hours.
Symptoms of Malware
- Increased CPU usage slowing down your device
- Computer freezing or crashing
- Decreased web browsing speed
- Unexplained network connection problems
- Modified or deleted files
- Presence of unknown files, programs, or desktop icons
- Unknown processes running
- Programs turning off or reconfiguring
- Emails sending without user knowledge or consent
Social Engineering
- Social engineering manipulates people into divulging confidential information or performing certain actions.
- Social engineers exploit the helpfulness or weaknesses of individuals.
Pretexting
- Pretexting involves an attacker lying to an individual to gain access to privileged data.
- Impersonating someone in need of personal or financial data to confirm identity.
Tailgating
- Tailgating involves an attacker quickly following an authorized person into a secure location.
Quid pro quo
- Quid pro quo is when attackers request personal information in exchange for something, such as a free gift.
Denial of Service (DoS) Attacks
- DoS attacks interrupt network services to users, devices, or applications.
- They are relatively simple to execute, even by unskilled attackers.
Overwhelming traffic
- An overwhelming quantity of traffic involves sending an unmanageable amount of data to a network, host, or application.
- This leads to slowdowns or crashes.
Maliciously formatted packets
- Maliciously formatted packets involve sending packets with errors or improper formatting over a network.
- The receiving device can't handle these packets, resulting in slow performance or crashes.
Distributed DoS (DDoS) Attacks
- DDoS attacks originate from multiple coordinated sources and are similar to DoS attacks.
- An attacker builds a botnet of infected hosts (zombies) controlled by handler systems, which scan and infect more hosts.
- The hacker instructs handler systems to use the botnet for a DDoS attack.
Botnets
- Botnets consist of infected computer by visiting unsafe websites or opening infected attachments/media files.
- A botnet is controlled by a command-and-control (C&C) server.
- Cybercriminals use botnets for activities like distributing malware, launching DDoS attacks, distributing spam, or brute-force password attacks.
- Cybercriminals rent botnets to third parties for nefarious purposes.
- Organizations use botnet traffic filters to identify botnet locations.
- Infected bots attempt to communicate with a C&C host and Cisco's firewall filters detect traffic from infected devices.
- Cloud-based Cisco Security Intelligence Operations (SIO) pushes down updated filters to firewalls for new botnets
- Cisco's security team is alerted to infected devices to mitigate threats.
On-Path Attacks
- On-path attackers intercept or modify communications between devices to collect information or impersonate.
- Also called man-in-the-middle (MitM) or man-in-the-mobile attacks.
Man-in-the-Middle (MitM)
- MitM attacks involve a cybercriminal taking control of a device without user knowledge to intercept and capture user information.
- Often used to steal financial information.
Man-in-the-Mobile (MitMo)
- A variation of MitM, targeting mobile devices to exfiltrate user-sensitive information.
- Ex: ZeuS malware captures two-step verification SMS messages.
SEO Poisoning
- Techniques to improve a website's visibility in search engine results.
- Attackers use SEO to promote malicious sites, called SEO poisoning.
- Goal of SEO poisoning to increase traffic to sites hosting malware or attempting social engineering.
Password Spraying
- Attacker tries common passwords across many accounts to avoid lockouts.
Dictionary Attacks
- Hacker systematically tries words from a dictionary as passwords.
Brute-Force Attacks
- Tries all possible character combinations.
Rainbow Table Attacks
- Uses precomputed hashes to crack passwords.
- Unlike brute-force, compares the hash of a password with those stored in the rainbow table.
Traffic Interception
- Intercepting unencrypted passwords in communications.
Advanced Persistent Threats (APTs)
- APTs are long-term, stealthy, multi-phase operations.
- Individual attackers usually lack resources to perform APTs.
- APTs are well-funded, targeting organizations or nations for business or political reasons, where the primary goal is to deploy customized malware and remain undetected.
Security Vulnerabilities and Exploits
- Security vulnerabilities : Software or hardware defects.
- Exploits : Programs written to take advantage of vulnerabilities.
- Attacks: Cybercriminals use exploits to carry out attacks to gain access to a system.
Hardware Vulnerabilities
- Hardware vulnerabilities often result from hardware design flaws.
- Rowhammer an exploit which triggers electrical interferences by repeatedly accessing a row of memory, corrupting RAM data.
Meltdown and Spectre
- Meltdown and Spectre are hardware vulnerabilities affecting CPUs released since 1995, allowing attackers to read all memory.
- Exploitations are side-channel attacks with capabilities to compromise large amounts of memory data.
- Traditional malware protection and physical security are sufficient protection for the everyday user.
Software Vulnerabilities
- Software vulnerabilities are usually introduced by errors in the operating system or application code.
- SYNful Knock vulnerability found in Cisco IOS allowed attackers to control enterprise-grade routers, through altered IOS versions.
- Integrity verification of downloaded IOS images, and limiting physical access to trusted personnel.
Buffer Overflow
- A vulnerability that occurs when data is written beyond the limits of a buffer. leads to a system crash, data compromise, or privilege escalation.
Non-Validated Input
- Incoming data with malicious content that causes a program to behave unexpectedly.
Race Conditions
- When the output of an event depends on ordered or timed outputs, which is used to create a vulnerability.
Weakness in Security Policies
- Using tested and verified coding algorithms for security is best practice, rather than creating your own which could introduce vulnerabilities.
Access Control Problems
- Access control is how you manage who accesses a system
- Many vulnerabilities are created by improper use of access controls.
- Physical access restrictions and data encryption help protect against compromised equipment.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.