Threats and Attacks on Endpoints

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Machine Learning (ML)

"Teaching" a device to "learn" by itself without the continual instructions of a computer programmer. It also learns through repeated experience.

Worm

A malicious program that uses a computer network to replicate (sometimes called a network virus)

Fileless virus

A virus that does not attach itself to a file but instead takes advantage of native services and processes that are part of the OS to avoid detection and carry out its attacks (it loads the code directly into the computer's random access memory (RAM).

Trojan

An executable program that masquerades as performing a benign activity but also does something malicious.

API

Application program interference

Three types of external software component hacking:

Application program interference (API) Device driver Dynamic-link library (DLL)

Tainted training data for machine learning

Attackers can attempt to alter the training data that is used by ML in order to produce false negatives to cloak themselves.

Application Attacks

Attacks that are targeted at web-based and other client-server applications.

Prime advantage to using AI to combat threats:

Continual learning and greater speed in response. AI can predict and prevent future attacks.

DLL

Dynamic-link library

Remote Access Trojan (RAT)

Has the basic functionality of a Trojan but also gives the threat actor unauthorized remote access to the victim's computer by using specially configured communication protocols. this creates an opening to the victim's computer allowing the threat agent unrestricted access

What is the primary action that cryptomalware performs?

Imprison

Pointer/object dereference

Improper exception handling situation is a NULL. When an application dereferences a pointer that has a value of NULL, it will typically cause a program to crash or exit.

ML

Machine learning

PUP

Potentially Unwanted Program

RAT

Remote Access Trojan

Adversarial Artificial Intelligence

Risks associated with AI and ML

Which type of application attack might use the following syntax? 'whatever' AND email IS NULL

SQL injection

Improper input handling

Software that allows the user to enter data but does not validate or filter user input to prevent a malicious action.

Malware

Software that enters a computer system without the user's knowledge or consent and then performs an unwanted and usually harmful action.

potentially unwanted program (PUP)

Software that often is not wanted, although it may not be explicitly malicious (advertising that obstructs content or interferes with web browsing, pop-up windows, search engine hacking, home page hacking, etc.)

SQL

Structured Query Language

Security of the ML algorithms (first risk)

These could be attacked and compromised, allowing threat actors to alter algorithms to ignore attacks.

What three things does Cybersecurity AI allow organizations?

To detect, predicts, and respond to cyberthreats in real time using ML

spyware

Tracking software that is deployed without the consent or control of the user.

logic bomb

a computer code that is typically added to a legitimate program but lies dormant and evades detection until a specific logical event triggers it

Request forgery

a request that has been fabricated

cryptomalware

a type of malware that imprisons users and encrypts all files on the device so that none of them can be opened. the cost for the key to unlock the cryptomalware increases every few hours or days.

Cross-Site Scripting (XSS)

a website that accepts user input without validating it and users that input in a response can be exploited. they can trick a valid website into feeding a malicious script to another user's web browser

Replay Attack

after intercepting and copying data, the threat actor retransmits selected and edited portions of the copied communications later to impersonate the legitimate user. these are usually between a user and an authentication server

resource exhaustion

attacks that "deplete" parts of memory and thus interfere with the normal operation of the program in RAM

Three types of evade malware

backdoor, logic bomb, rootkit

CSFR

cross-site request forgery

Two types of request forgeries

cross-site request forgery (CSFR) and server-site request forgery (SSRF)

Five advantages of a fileless virus

easy to infect extensive control persistent difficult to detect difficult to defend against

Three attacks that are directly focused on vulnerabilities in the software applications:

exploiting memory vulnerabilities, improper exception and error handling, external software components

Two types of viruses

file-bases and fileless

backdoor

gives access to a computer, program, or service that circumvents normal security protections

armored file-based virus

goes to great lengths to avoid detection

What are the 5 types of primary actions of malware

imprison, launch, snoop, deceive, evade

injections

introduce new input to exploit a vulnerability

file-based virus

malicious code that is attached to a file that reproduces itself on the same computer without any human intervention

rootkit

malware that can hide its presence and the presence of other malware on the computer. its does this by accessing "lower layers" of the OS to make altercations

buffer overflow attack

occurs when a process attempts to store data in RAM beyond the boundaries of a fixed-length storage buffer

SQL Injection

one of the most common injection attacks that inserts statements to manipulate a database server. targets SQL servers by introducing malicious commands into them

Ransomware

prevents a user's device from properly operating until a fee is paid

What are the 2 types of imprisons malware

ransomware and cryptomalware

SSRF

server-site request forgery

keylogger

silently captures and stores each keystroke that a user types on the computer's keyboard. it can be a software program or a small hardware device.

Two techniques of the armored file-based virus

split infection and mutation

Two common types of snooping malware

spyware and keyloggers

server-site request forgery (SSRF)

takes advantage of a trusting relationship between web servers. it exploits how a web server processes external information received from another server

Cross-Site Request Forgery (CSRF)

takes advantage of an authentication "token" that a website sends to a user's web browser. if a user is currently authenticated on a website and is then tricked into loading another webpage, the new page inherits the identity and privileges of the victim, who may then perform an undesired function on the attacker's behalf

Bot

the infected robot computer is known as a bot or zombie. the malware is placed under the remote control of an attacker for he purpose of launching attacks. infected bot computers receive instructions through a command and control (C&C) structure from the bot herders

what does a virus do to perform malicious action

the virus first unload a payload to perform a malicious action, then the virus replicates itself by inserting its code into another file on the same computer

What 3 attacks can malware launch onto computers

virus, worm, and bot

integer overflow attack

when an attacker changes the value of a variable to something outside the range that the programmer had intended by using an integer overflow


Ensembles d'études connexes

PTI BLOCK 1: Nervous System B1L5

View Set

The real leadership lessons of Steve Jobs

View Set

ARM 400 Practice Exams - all chapters!!!!

View Set

Chapter 2: Exercise Pre-participation Health Screening

View Set

Goal Setting-How to Write a Smart Goal

View Set