1.2 Given a scenario, analyze potential indicators to determine the type of attack. Flashcards
Malware
Malware or malicious code is any element of software that performs an unwanted function from the perspective of the legitimate user or owner of a computer system.
Ransomware
Ransomware is a form of malware that takes over a computer
system, usually by encrypting user data, to hinder its use while demanding payment.
Trojan
A Trojan or Trojan horse is a means of delivering malicious software
by disguising inside of something useful or legitimate.
Worms
Worms are designed to exploit a specific vulnerability in a system and
then use that flaw to replicate themselves to other systems. Worms typically focus on replication and distribution, rather than on direct damage and destruction.
PUPs
Potentially unwanted programs (PUPs) are any type of questionable
software. Anything that is not specifically malware but still otherwise unwanted on a typcal computer system could be considered a PUP.
File less virus
Fileless viruses reside in memory only and do not save themselves to the local storage devices.
command and control.
Command and control (C&C) is an intermediary
communication service often used by botnets.
Bots and Botnets
Bots are the infection agents that make up a botnet. A botnet is a network of systems infected by malicious software agents controlled by a hacker to
launch massive attacks against targets.
Cryptomalware
Cryptomalware is a form of malware that uses the system
resources of an infected computer to mine cryptocurrencies.
Logic Bombs
A logic bomb is a form of malicious code that remains dormant
until a triggering event or condition occurs.
Spyware
Spyware is any form of malicious code or even business or
commercial code that collects information about users without their direct knowledge or
permission.
Understand adwa
Adware
Adware displays pop-up or alternate advertisements to users based
on their activities, URLs they have visited, applications they have accessed, and so on.
Keylogger
A keylogger is a form of unwanted software that records the keystrokes typed into a system’s keyboard.
RAT
A remote-access Trojan (RAT) is a form of malicious code that grants
an attacker some level of remote-control access to a compromised system
Rootkits
A rootkit is a special type of hacker tool that embeds itself deep
within an operating system (OS), where it can manipulate information seen by the OS and
displayed to users.