1.2 Analyze potential indicators to determine the type of attack Flashcards
Any element of software that performs an unwanted function from the perspective of the legitimate user or owner of a computer system.
Malware
A form of malware that takes over a computer system, usually by encrypting user data, to hinder its use while demanding payment.
Ransomware
A means of delivering malicious software by disguising it inside of something useful or legitimate.
Trojans (Trojan Horse)
Malware designed to exploit a specific vulnerability in a system and then use that flaw to replicate themselves to other systems. They typically focus on replication and distribution, rather than on direct damage and destruction.
Worms
Any type of questionable software that is not specifically malware but is still otherwise unwanted on a typical computer system.
Potentially Unwanted Programs (PUPS)
A type of malware that resides in the memory only and does not save itself to the local storage devices
Fileless Virus
An intermediary communication service often used by botnets.
Command and Control
The infection agents that make up a botnet.
Bots
A network of systems infected by malicious software agents controlled by a hacker to launch massive attacks against targets.
Botnet
A form of malware that uses the system resources of an infected computer to mine cryptocurrencies.
Cryptomalware
A form of malicious code that remains dormant until a triggering event or condition occurs.
Logic Bombs
Any form of malicious code or even business or commercial code that collects information about users without their direct knowledge or permission.
Spyware
A form of unwanted software that records the keystrokes typed into a system’s keyboard.
Keylogger
A form of malicious code that grants an attacker some level of remote-control access to a compromised system.
Remote Access Trojan (RAT)
A special type of hacker tool that embeds itself deep within an operating system, where it can manipulate information seen by the OS and displayed to users.
Rootkit