2.4 Malicious Code Attacks and Defenses Flashcards

(17 cards)

1
Q

What is the definition of malicious code?

A

Malicious code is any code in any part of a software system or script that is intended to cause harm, such as gaining unauthorized access, disrupting operations, or stealing data.

Examples include viruses, worms, and ransomware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How do attacks that rely on user error differ from those using malicious code?

A

Attacks relying on user error, such as social engineering and misconfigurations, are considered less technically demanding compared to those using malicious code which require more technical expertise.

Malicious code attacks often involve crafting and deploying specialized code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

List three common forms that malicious code can take.

A
  • Executables
  • Scripts
  • Macro viruses

These forms allow attackers to exploit specific vulnerabilities in systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the primary role of a firewall in defending against malicious code?

A

The primary role of a firewall is to block traffic known to be malicious from passing through the network.

It acts as a barrier to prevent unwanted data from entering or leaving.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What vulnerability did the WannaCry ransomware attack exploit?

A

WannaCry exploited a vulnerability in Server Message Block version 1 (SMBv1) on Windows systems.

This flaw allowed for arbitrary code execution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How did attackers gain access to credit card information during the British Airways incident?

A

Attackers injected 22 lines of malicious JavaScript code onto the checkout pages of British Airways’ website, which collected payment details from customers.

This attack is an example of Cross-Site Scripting (XSS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of malicious code was used in the Estonian Central Health Database breach?

A

SQL injection was the type of malicious code used to breach the Estonian Central Health Database.

The consequence was a compromise of all health information for Estonian citizens.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What crucial defense mechanism is highlighted as essential for preventing malicious code attacks?

A

User training is highlighted as a crucial defense mechanism for preventing malicious code attacks.

Training users in secure computing habits helps prevent initial compromises.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do continuous updates and patches contribute to defense against malicious code?

A

Continuous updates and patches help by consistently closing vulnerabilities as soon as security issues are discovered.

This proactive approach prevents attackers from exploiting known weaknesses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does ‘arbitrary code execution’ mean in the context of the WannaCry attack?

A

‘Arbitrary code execution’ means the attacker could run any software they desired on a user’s machine, allowing them to gain access to the operating system.

This facilitated the installation of further malware, such as ransomware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True or False: Social engineering is a type of attack that relies on technical vulnerabilities.

A

False

Social engineering relies on psychological manipulation rather than technical flaws.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Fill in the blank: A _______ is a type of malicious software that blocks access to a computer system until a ransom is paid.

A

Ransomware

Ransomware typically encrypts data to prevent access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define Cross-Site Scripting (XSS).

A

Cross-Site Scripting (XSS) is a type of malicious code injection attack where an attacker injects malicious scripts into a legitimate website.

These scripts are then executed by other users’ browsers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are patches in the context of software security?

A

Patches are software updates designed to fix bugs, improve performance, or address security vulnerabilities in a program or operating system.

Regular patching is crucial for maintaining system security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a Trojan Horse in cybersecurity?

A

A Trojan Horse is a type of malware that disguises itself as legitimate software but contains malicious functions when executed.

It often tricks users into installing it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the role of anti-malware software?

A

Anti-malware software is designed to prevent, detect, and remove malicious software.

It primarily blocks executables, scripts, and macro viruses.

17
Q

What is SQL Injection?

A

SQL Injection is a web security vulnerability that allows an attacker to interfere with the queries an application makes to its database.

This can potentially allow attackers to view, modify, or delete data.