What is the definition of malicious code?
Malicious code is any code in any part of a software system or script that is intended to cause harm, such as gaining unauthorized access, disrupting operations, or stealing data.
Examples include viruses, worms, and ransomware.
How do attacks that rely on user error differ from those using malicious code?
Attacks relying on user error, such as social engineering and misconfigurations, are considered less technically demanding compared to those using malicious code which require more technical expertise.
Malicious code attacks often involve crafting and deploying specialized code.
List three common forms that malicious code can take.
These forms allow attackers to exploit specific vulnerabilities in systems.
What is the primary role of a firewall in defending against malicious code?
The primary role of a firewall is to block traffic known to be malicious from passing through the network.
It acts as a barrier to prevent unwanted data from entering or leaving.
What vulnerability did the WannaCry ransomware attack exploit?
WannaCry exploited a vulnerability in Server Message Block version 1 (SMBv1) on Windows systems.
This flaw allowed for arbitrary code execution.
How did attackers gain access to credit card information during the British Airways incident?
Attackers injected 22 lines of malicious JavaScript code onto the checkout pages of British Airways’ website, which collected payment details from customers.
This attack is an example of Cross-Site Scripting (XSS).
What type of malicious code was used in the Estonian Central Health Database breach?
SQL injection was the type of malicious code used to breach the Estonian Central Health Database.
The consequence was a compromise of all health information for Estonian citizens.
What crucial defense mechanism is highlighted as essential for preventing malicious code attacks?
User training is highlighted as a crucial defense mechanism for preventing malicious code attacks.
Training users in secure computing habits helps prevent initial compromises.
How do continuous updates and patches contribute to defense against malicious code?
Continuous updates and patches help by consistently closing vulnerabilities as soon as security issues are discovered.
This proactive approach prevents attackers from exploiting known weaknesses.
What does ‘arbitrary code execution’ mean in the context of the WannaCry attack?
‘Arbitrary code execution’ means the attacker could run any software they desired on a user’s machine, allowing them to gain access to the operating system.
This facilitated the installation of further malware, such as ransomware.
True or False: Social engineering is a type of attack that relies on technical vulnerabilities.
False
Social engineering relies on psychological manipulation rather than technical flaws.
Fill in the blank: A _______ is a type of malicious software that blocks access to a computer system until a ransom is paid.
Ransomware
Ransomware typically encrypts data to prevent access.
Define Cross-Site Scripting (XSS).
Cross-Site Scripting (XSS) is a type of malicious code injection attack where an attacker injects malicious scripts into a legitimate website.
These scripts are then executed by other users’ browsers.
What are patches in the context of software security?
Patches are software updates designed to fix bugs, improve performance, or address security vulnerabilities in a program or operating system.
Regular patching is crucial for maintaining system security.
What is a Trojan Horse in cybersecurity?
A Trojan Horse is a type of malware that disguises itself as legitimate software but contains malicious functions when executed.
It often tricks users into installing it.
What is the role of anti-malware software?
Anti-malware software is designed to prevent, detect, and remove malicious software.
It primarily blocks executables, scripts, and macro viruses.
What is SQL Injection?
SQL Injection is a web security vulnerability that allows an attacker to interfere with the queries an application makes to its database.
This can potentially allow attackers to view, modify, or delete data.