Can you name, explain, and give examples of categories of outsiders who could be
ID: 3671789 • Letter: C
Question
Can you name, explain, and give examples of categories of outsiders who could be a threat?
What is malware?
What is its threat agent?
Can you explain and give examples of malware transport mechanisms?
Can you explain and give examples of malware payloads?
What is a trapdoor (or backdoor)?
What is a logic bomb?
What is a time bomb?
What is a Trojan horse?
What is a RAT?
What is a software bacterium?
What is a software virus?
What is a software worm?
What is a rootkit? Why is it used?
What is spyware?
What is adware?
What are some risks when performing offensive security operations?
Do you have to be an expert attacker to successfully defend against attacks?
Why is defense harder than offense in this context?
What is a countermeasure? Can you name and explain the three types?
Explanation / Answer
MALWARE :
Malware is genric term of " evil software"
Malware is a software designed specifically to damage or disrut a system such as virus or a trojan
RAT :
Remote Access Trojan : is a malware program that includes a back door for administrative control over the target computer.
RATs are usually downloaded invisibly with a user requested program
SPYWARE :
spyware is a blended threat that covertly collects data about system users and sends it to a designated
repository.
TIMEBOMB :
TimeBomb is a Virus with trigger linked to a certain year,month,day or time that causes it to execute.
LOGICBOMB :
Logic Bomb a virus witha trigger , usually an event, that causes it to excute
TROJAN HORSE:
Trojan Horse is a malicious computer program with side effects that are not indeteded by user who executes program which also known as Trojan Horse
SOFTWARE VIRUS :
Software Virus is a program that replicates itself on a computer system by incorporating itself into other programs,including those in secondary storage , that are shared among other computer system.
SOFTWARE WORM:
Software Worm is a computer program that replicates itself and is self-propagating in main memory.
Worms, as opppsed to viruses are meant to spawn in network environments.
TRAPDOOR:
Trapdoor an unspecified and undocumentary entry point to the system which represents a significant security risk.
COUNTERMEASURE :
The methods companies use to thwart attacks are called countermeasures.
Three types are :: Preventative , Detective and Corrective
ADWARE :
its ofen called Advertising supported software is used when referencing any type of program that downloads or displays unwanted banner and advertisements in the software being used.