Exam 3: Network and Computer Attacks
What types of ports do successful Trojan programs commonly use?
A good software or hardware firewall would most likely identify traffic that's using unfamiliar ports,but Trojan programs that use common ports,such as TCP port 80 (HTTP)or UDP port 53 (DNS),are more difficult to detect.
The programmer who wrote Backdoor.Slackbot.B controlled a computer by using Internet Relay Chat (IRC),which is on port 6667.
____________________ or rootkits are computer programs that give attackers a means of regaining access to the attacked computer later.
Backdoors
Some security professionals use fear tactics to scare users into complying with security measures. Is this a good tactic?
Some security professionals use fear tactics to scare users into complying with security measures.Their approach is to tell users that if they don't take a particular action,their computer systems will be attacked by every malcontent who has access to the Internet.This method is sometimes used to generate business for security testers and is not only unethical,but also against the OSSTMM's Rules of Engagement.The rule states: "The use of fear,uncertainty,and doubt may not be used in the sales or marketing presentations,websites,supporting materials,reports,or discussion of security testing for the purpose of selling or providing security tests.This includes but is not limited to crime,facts,criminal or hacker profiling,and statistics."
Your approach to users or potential customers should be promoting awareness rather than instilling fear.You should point out to users how important it is not to install computer programs-especially those not approved by the company-on their desktops because of the possibility of introducing malware.Users should be aware of potential threats,not terrified by them.
MATCHING
Match each term with the correct statement below.
-executable piece of programming code that should not appear in an e-mail attachment
MATCHING
Match each term with the correct statement below.
-purported to have shut down more than 13,000 ATMs
MATCHING
Match each term with the correct statement below.
-2005 hybrid worm with backdoor capabilities spread by mass e-mailing and exploiting Windows vulnerabilities
MATCHING
Match each term with the correct statement below.
-worm that uses UDP port 8998 to contact the attacker's server
The average home user or small-business owner doesn't typically use Telnet.
The two most popular spyware and adware removal programs are ____ and Ad-Aware.
The most effective approach to protect a network from malware being introduced is to conduct structured training of all employees and management.
Software keyloggers behave like ____ and are loaded on a computer.
Antivirus software compares ____________________ of known viruses against the files on the computer; if there's a match, the software warns you that the program or file is infected.
____ is concerned with the security of computers or devices that are part of a network infrastructure.
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)