Podcast
Questions and Answers
What is the name of the ransomware that was first reported in 2013?
What is the name of the ransomware that was first reported in 2013?
What is the term for a type of malware that spreads from system to system without the need for human interaction?
What is the term for a type of malware that spreads from system to system without the need for human interaction?
What is the term for a type of malware that disguises itself as legitimate software?
What is the term for a type of malware that disguises itself as legitimate software?
What is the term for a type of cyber attack where an attacker injects malicious code into a website's database?
What is the term for a type of cyber attack where an attacker injects malicious code into a website's database?
Signup and view all the answers
What is the term for a type of web attack where an attacker tricks a user into performing an unintended action?
What is the term for a type of web attack where an attacker tricks a user into performing an unintended action?
Signup and view all the answers
What is the term for a type of web attack where an attacker injects malicious scripts into a website?
What is the term for a type of web attack where an attacker injects malicious scripts into a website?
Signup and view all the answers
What is the main difference between Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF) attacks?
What is the main difference between Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF) attacks?
Signup and view all the answers
What is the term for a type of malware that combines the characteristics of viruses, worms, and trojan horses?
What is the term for a type of malware that combines the characteristics of viruses, worms, and trojan horses?
Signup and view all the answers
What is the name of the ransomware that was spread through Facebook Messenger in 2018?
What is the name of the ransomware that was spread through Facebook Messenger in 2018?
Signup and view all the answers
What is the primary goal of a SQL injection attack?
What is the primary goal of a SQL injection attack?
Signup and view all the answers
How can SQL injection attacks be prevented?
How can SQL injection attacks be prevented?
Signup and view all the answers
What is the purpose of the '--' symbol in SQL?
What is the purpose of the '--' symbol in SQL?
Signup and view all the answers
What is the main goal of a Cross-Site Request Forgery (CSRF) attack?
What is the main goal of a Cross-Site Request Forgery (CSRF) attack?
Signup and view all the answers
What is the main difference between a Cross-Site Scripting (XSS) attack and a SQL injection attack?
What is the main difference between a Cross-Site Scripting (XSS) attack and a SQL injection attack?
Signup and view all the answers
What is a common technique used to exploit a SQL injection vulnerability?
What is a common technique used to exploit a SQL injection vulnerability?
Signup and view all the answers
What is the primary purpose of a web attack?
What is the primary purpose of a web attack?
Signup and view all the answers
What is a type of malware that involves adding malicious code to genuine macro sequences in documents or saved sequences of commands?
What is a type of malware that involves adding malicious code to genuine macro sequences in documents or saved sequences of commands?
Signup and view all the answers
What is a type of malware that demands payment in exchange for restoring access to data?
What is a type of malware that demands payment in exchange for restoring access to data?
Signup and view all the answers
What is a type of malware that combines the features of multiple types of malware?
What is a type of malware that combines the features of multiple types of malware?
Signup and view all the answers
What is the primary way that malware is spread through emails?
What is the primary way that malware is spread through emails?
Signup and view all the answers
What is a type of malware that is used to gain unauthorized access to a system or network?
What is a type of malware that is used to gain unauthorized access to a system or network?
Signup and view all the answers
What is a type of malware that is used to steal sensitive information, such as login credentials?
What is a type of malware that is used to steal sensitive information, such as login credentials?
Signup and view all the answers
What is a type of cyber attack that involves injecting malicious code into a database?
What is a type of cyber attack that involves injecting malicious code into a database?
Signup and view all the answers
What is a type of cyber attack that involves using a network of infected computers to launch attacks on other systems?
What is a type of cyber attack that involves using a network of infected computers to launch attacks on other systems?
Signup and view all the answers
Study Notes
Web Attacks
- Cross-Site Request Forgery (CSRF) exploits the trust a site has in a user's browser.
- Cross-Site Scripting Attack (XSS) exploits the trust a user has for a particular site.
- SQL injection Attack involves injecting malicious SQL code to retrieve sensitive data or modify data without authorization.
SQL Injection
- Example of SQL injection:
<a href="https://insecure-website.com/products?category=Gifts">https://insecure-website.com/products?category=Gifts</a>' OR 1=1 --
- This injection retrieves all products including hidden data, bypassing restrictions.
- SQL injection can be prevented by using parameterized queries (prepared statements) instead of string concatenation within the query.
Software Threats
- Types of software threats: worms, viruses, Trojan horse programs, ransomware, blended threats.
- Examples of ransomware: CryptoLocker (2013), CryptoWall (2014), WannaCry (2017), Petya (2017), Bad Rabbit (2017), Samsam (2016), Jigsaw (2016).
- FacexWorm (May 2018) targeted cryptocurrency and spread through Facebook Messenger.
- Methods of infection: Content Internet File System (CIFS), Simple Mail Transfer Protocol (SMTP), HyperText Transfer Protocol (HTTP).
Malware
- Malware types: botnets, ransomware, keylogger, virus, Trojan horse, adware, spyware, rootkit.
- File infectors, macro viruses, overwrite viruses, polymorphic viruses, resident viruses, system or boot-record infectors are types of viruses.
- Macros are keystrokes embedded in documents or saved sequences for commands, which can be exploited by adding malicious code to genuine macro sequences.
- Methods of malware spreading: social networks, email, text messages, internet downloads.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Learn about common web attacks, including Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF), and SQL injection attacks. Understand how they exploit user trust and website vulnerabilities.