What are the 2 types of threats?
What is Adware?
Displays popups of advertising downloads when the user is online
What is an Attack kit?
A set of tools that generates new malware automatically using a **variety of propagation **
What is a Auto-rooter?
Used to break into new machines remotely – to the highest root to gain full access
What is Backdoor?
Bypass a normal security check via a compromised system such as using a password
What are Downloaders?
Code that installs other items on the machine that is under attack. It is normally included in the malware code which is placed in a compromised system
What is Drive-by Download?
Uses a code to compromise a website to exploit a browser vulnerability to attack a client system the website is viewed
What is Flooders?
Generating a volume of data to attack a networked computer system by applying DOS attack
What is Keyloggers?
captures keystrokes in a compromised system
What is a Logic bomb?
A program that is timed to cause harm at a certain point of time. It stays inactive until the time comes.
What is a Marco Virus?
What is a Mobile code?
A code transferred between systems/across a network in an email, document, file or a website which is executed via a network or a storage device
What is Rootkit?
A set of hacker tools used after the attacker had broken into a computer and gained root-access
What is Spyware?
What is a Trojan horse?
Classification of Malware
Independent, self-contained = Worms, Trojans and bots
Malware DOES NOT replicate = Trojans and Spam emails
Replicates viruses and worms
Propagation mechanisms
What is a Virus?
Finding weakness in OS and Hardware
Worm
What are the 3 Intruder classes?
Surpasses control to evade auditing and access controls to surpass audit collection
Give Examples of intrusion
What is a hacker?
What are the attacker motivations?
Examples of Attacks
DOS
Distributed denial of service
Cross side scripting attacks
Buffer over flow attacks