2.4 Malicious Code Flashcards

(3 cards)

1
Q

Exploiting a vulnerability

A
  • An attacker can use many techniques
    –Social engineering
    –Default credentials
    –Misconfiguration
  • These don’t require technical skills
    –The door is already unlocked
  • There are still ways to get into a well-secured system
    –Exploit with malicious code
    –Knock the pins out of a door hinge
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Malicious code

A
  • The attackers use any opportunity
    –The types of malicious code are varied and many
  • Many different forms
    –Executable, scripts, macro viruses, worms, Trojan
    horse, etc.
  • Protection comes from many different sources
    –Anti-malware
    –Firewall
    –Continuous updates and patches
    –Secure computing habits
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Malicious Code examples

A
  • WannaCry ransomware
    –Executable exploited a vulnerability in Windows SMBv1
    –Arbitrary code execution
  • British Airways cross-site scripting
    –22 lines of malicious JavaScript code placed on checkout
    pages
    –Information stolen from 380,000 victims
  • Estonian Central Health Database
    –SQL injection
    –Breached all healthcare information for an entire country
How well did you know this?
1
Not at all
2
3
4
5
Perfectly