Web Security Threats
24 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the name of the ransomware that was first reported in 2013?

  • Bad Rabbit
  • WannaCry
  • CryptoLocker (correct)
  • CryptoWall
  • What is the term for a type of malware that spreads from system to system without the need for human interaction?

  • Blended Threat
  • Worm (correct)
  • Trojan Horse
  • Virus
  • What is the term for a type of malware that disguises itself as legitimate software?

  • Trojan Horse (correct)
  • Virus
  • Worm
  • Ransomware
  • What is the term for a type of cyber attack where an attacker injects malicious code into a website's database?

    <p>SQL Injection Attack</p> Signup and view all the answers

    What is the term for a type of web attack where an attacker tricks a user into performing an unintended action?

    <p>Cross-Site Request Forgery (CSRF)</p> Signup and view all the answers

    What is the term for a type of web attack where an attacker injects malicious scripts into a website?

    <p>Cross-Site Scripting Attack (XSS)</p> Signup and view all the answers

    What is the main difference between Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF) attacks?

    <p>XSS exploits the trust a user has for a particular site, while CSRF exploits the trust a site has in a user's browser.</p> Signup and view all the answers

    What is the term for a type of malware that combines the characteristics of viruses, worms, and trojan horses?

    <p>Blended Threat</p> Signup and view all the answers

    What is the name of the ransomware that was spread through Facebook Messenger in 2018?

    <p>FacexWorm</p> Signup and view all the answers

    What is the primary goal of a SQL injection attack?

    <p>To retrieve hidden data or subvert application logic</p> Signup and view all the answers

    How can SQL injection attacks be prevented?

    <p>By using parameterized queries (prepared statements) instead of string concatenation</p> Signup and view all the answers

    What is the purpose of the '--' symbol in SQL?

    <p>To indicate a comment</p> Signup and view all the answers

    What is the main goal of a Cross-Site Request Forgery (CSRF) attack?

    <p>To cause a user's browser to perform unwanted actions on a trusted website</p> Signup and view all the answers

    What is the main difference between a Cross-Site Scripting (XSS) attack and a SQL injection attack?

    <p>XSS attacks exploit bugs in trusted websites, while SQL injection attacks exploit bugs in database queries</p> Signup and view all the answers

    What is a common technique used to exploit a SQL injection vulnerability?

    <p>Injecting malicious SQL code as user input</p> Signup and view all the answers

    What is the primary purpose of a web attack?

    <p>To steal sensitive user data</p> Signup and view all the answers

    What is a type of malware that involves adding malicious code to genuine macro sequences in documents or saved sequences of commands?

    <p>Macro virus</p> Signup and view all the answers

    What is a type of malware that demands payment in exchange for restoring access to data?

    <p>Ransomware</p> Signup and view all the answers

    What is a type of malware that combines the features of multiple types of malware?

    <p>Blended threat</p> Signup and view all the answers

    What is the primary way that malware is spread through emails?

    <p>Human action</p> Signup and view all the answers

    What is a type of malware that is used to gain unauthorized access to a system or network?

    <p>Rootkit</p> Signup and view all the answers

    What is a type of malware that is used to steal sensitive information, such as login credentials?

    <p>Keylogger</p> Signup and view all the answers

    What is a type of cyber attack that involves injecting malicious code into a database?

    <p>SQL injection</p> Signup and view all the answers

    What is a type of cyber attack that involves using a network of infected computers to launch attacks on other systems?

    <p>Botnet</p> Signup and view all the answers

    Study Notes

    Web Attacks

    • Cross-Site Request Forgery (CSRF) exploits the trust a site has in a user's browser.
    • Cross-Site Scripting Attack (XSS) exploits the trust a user has for a particular site.
    • SQL injection Attack involves injecting malicious SQL code to retrieve sensitive data or modify data without authorization.

    SQL Injection

    • Example of SQL injection: <a href="https://insecure-website.com/products?category=Gifts">https://insecure-website.com/products?category=Gifts</a>' OR 1=1 --
    • This injection retrieves all products including hidden data, bypassing restrictions.
    • SQL injection can be prevented by using parameterized queries (prepared statements) instead of string concatenation within the query.

    Software Threats

    • Types of software threats: worms, viruses, Trojan horse programs, ransomware, blended threats.
    • Examples of ransomware: CryptoLocker (2013), CryptoWall (2014), WannaCry (2017), Petya (2017), Bad Rabbit (2017), Samsam (2016), Jigsaw (2016).
    • FacexWorm (May 2018) targeted cryptocurrency and spread through Facebook Messenger.
    • Methods of infection: Content Internet File System (CIFS), Simple Mail Transfer Protocol (SMTP), HyperText Transfer Protocol (HTTP).

    Malware

    • Malware types: botnets, ransomware, keylogger, virus, Trojan horse, adware, spyware, rootkit.
    • File infectors, macro viruses, overwrite viruses, polymorphic viruses, resident viruses, system or boot-record infectors are types of viruses.
    • Macros are keystrokes embedded in documents or saved sequences for commands, which can be exploited by adding malicious code to genuine macro sequences.
    • Methods of malware spreading: social networks, email, text messages, internet downloads.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Learn about common web attacks, including Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF), and SQL injection attacks. Understand how they exploit user trust and website vulnerabilities.

    More Like This

    Use Quizgecko on...
    Browser
    Browser