What is the main difference between a worm and other types of malware quizlet?

Recommended textbook solutions

What is the main difference between a worm and other types of malware quizlet?

Social Psychology

10th EditionElliot Aronson, Robin M. Akert, Samuel R. Sommers, Timothy D. Wilson

525 solutions

What is the main difference between a worm and other types of malware quizlet?

Anderson's Business Law and the Legal Environment, Comprehensive Volume

23rd EditionDavid Twomey, Marianne Jennings, Stephanie Greene

369 solutions

What is the main difference between a worm and other types of malware quizlet?

Human Resource Management

15th EditionJohn David Jackson, Patricia Meglich, Robert Mathis, Sean Valentine

249 solutions

What is the main difference between a worm and other types of malware quizlet?

Principles of Operations Management: Sustainability and Supply Chain Management

10th EditionBarry Render, Chuck Munson, Jay Heizer

1,096 solutions

- another phishing attack technique.
- involves targeting particular users, who include those in key positions, such as security officers, network or system administrators, or even managers and executives
- the attacker has usually done some background work to craft the phishing e-mail to lure a specific victim. For example, the attacker may use social engineering or do some research on the victim to discover personal details, including likes, hobbies, associates, and so on, so that these details can be included in the phishing e-mail to make it appear more legitimate.
- user education is probably the most effective deterrent against this type of attack

-a general type of attack, usually perpetrated on hosts after the attacker has gained some sort of low-level access to the system
- attacker may gain privileged access to the system by using an ordinary user or guest account --> to gain a higher level of privileges on the system, allowing her to control the system, broaden her attack, and gain access to sensitive data.
- exploiting the configuration settings on the host, taking advantage of weak encryption or authentication methods, or even exploiting software or operating system vulnerabilities, such as buffer overflow or input injection attacks. These types of attacks may allow the attacker to run arbitrary code on the system, resulting in privilege escalation.
- prevention --> comprehensive system hardening program --> involves keeping security patches current, locking down configuration settings, allowing only the least privileges required on the system

- attacker would use specially crafted dictionaries, or word lists, which include not only common words, but also very specific words used in areas such as medicine, religion, sports, and so on.
- work simply by going through the entire word list, hashing each word in the list, comparing that hash to the one the attacker has from the credentials database, and seeing if they match. If the hashes match, the attacker knows he found the correct password. If not, he simply goes to the next word in the list and repeat the process.
- very fast and efficient, and as long as the password is one of the words in the list, the attack will be successful

- attack has both social engineering and technical components to it.
- the attacker compromises a secondary system, such as a popular web site. She compromises the system, knowing that eventually users will come to it for information or data, and then she can strike.
- attacker may use social engineering techniques to determine that the user frequents that particular web site or system, or even to get the user to visit that particular site.
Example, the attacker may compromise a web site that a business frequently uses to order supplies. Then the attacker simply waits for the business users to visit the site, before attempting to send malware down to the user's hosts.
- To prevent this type of attack, user education on social engineering attacks is valuable, but also, on a more technical level, the use of the newer techniques of DNS firewalling and reputation-based protection may be used.

Students also viewed

Recommended textbook solutions

What is the main difference between a worm and other types of malware quizlet?

Social Psychology

10th EditionElliot Aronson, Robin M. Akert, Samuel R. Sommers, Timothy D. Wilson

525 solutions

What is the main difference between a worm and other types of malware quizlet?

Human Resource Management

15th EditionJohn David Jackson, Patricia Meglich, Robert Mathis, Sean Valentine

249 solutions

What is the main difference between a worm and other types of malware quizlet?

Service Management: Operations, Strategy, and Information Technology

7th EditionJames Fitzsimmons, Mona Fitzsimmons

103 solutions

What is the main difference between a worm and other types of malware quizlet?

Operations Management: Sustainability and Supply Chain Management

12th EditionBarry Render, Chuck Munson, Jay Heizer

1,698 solutions

What is the main difference between a worm and other types of malware?

In brief: Viruses and worms both cause damage and copy themselves rapidly. The main difference is how they self-replicate, with viruses requiring the help of a host and worms acting independently. Unlike viruses, worms can replicate and spread without any human activation.

What is the main difference between virus and worm malware quizlet?

The primary difference between a virus and a worm is that a virus must attach to something, such as an executable file, in order to spread. Worms do not need to attach to anything to spread and can tunnel themselves into computers.

What is the difference between virus worm malware and spyware?

A Worm is a form of malware that replicates itself and can spread to different computers via Network. Spyware is a form of malware designed to collect your personal information. The main objective of worms to eat the system resources. The main objective of the spyware is to monitor the activity of the system.

What's the difference between malware Trojan virus and worm?

Blaster Worm., the worm has been designed to tunnel into your system and allow malicious users to control your computer remotely. A Trojan horse is not a virus. It is a destructive program that looks as a genuine application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive.