1.13 Ransomware + Crypto Malware Flashcards

Security+

1
Q

What is Ransomware?

A

A type of malware that encrypts files or locks users out of their systems, demanding payment. (Usually crypto currency) to restore access or decrypt files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How is Ransomware Distributed?

A

Ransomware is spread through phishing emails, malicious attachments, compromised websites, or by exploiting vulnerabilities in software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Encrypting Ransomware

A

Encrypts files on the victims system and demands payment for the decryption key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Locker Ransomware

A

Locks users out of their systems entirely. Preventing access until a ransom is paid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Crypto-Malware

A
  • A newer generation of ransomware
  • Malware that encrypts your files and data on a computer, making them inaccessible. The attacker then demands $$ or Bitcoin in exchange for the key that decrypts your information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Protecting Against Ransomware

A
  • Always have a backup, ideally an offline backup that is not immediately accessible from the users computer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Protecting Against Ransomware

A
  • Keep your OS up to date
  • Keep your applications up to date
  • Patch up vulnerabilities
  • Keep your anti-virus/ anti-malware signatures up to date
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a Trojan Horse?

A

Malicious programs disguised as legitimate software or files. Trojans trick users into executing/ launching the software or files through social engineering like phishing emails or fake downloads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Trojan Horse?

A

Trojans Horse software is designed to be undetected by the users and the systems anti-virus software,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Characteristics of Trojan Horses?

A

Trojans Horse software can get onto the users system, disable the security tools and have unlimited access to the system.

  • This creates potential gates (backdoors) to be opened for other programs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does PUP stand for?

A

Potential Unwanted Program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define PUP

A
  • Potentially undesired software commonly downloaded on a users system by Trojan Horse software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Characteristics of PUPs?

A
  • Identified
How well did you know this?
1
Not at all
2
3
4
5
Perfectly