1.2 Malware Flashcards

1
Q

Ransomware

A

A type of malicious software designed to block access to a computer system or files until a sum of money is paid. Involves encrypting the victims files making them inaccessible and then displaying a ransom message with instructions on how to pay.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Torjans

A

A type of malicious software that disguises itself as something legitimate or benign but in reality carries a malicious payload. They rely on social engineering tactics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Worms

A

A type of malicious software that is designed to spread across computer networks often without any user intervention. They can replicate independently and spread across networks by exploiting vulnerabilities in operating systems or other software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Potentially Unwanted Programs

A

Software applications that, while not necessarily malicious, may exhibit behavior said users may find under desirable or unwanted. Often bundled with legitimate software or offered as optional installations during the installation process of another program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Fileless Virus/Fileless Malware/Memory Based Malware

A

A type of malicious software that operates in a system’s memory (RAM) Rather than relying on traditional files stored on the hard drive. Unlike traditional viruses or malware that involve the creation of an executable file on a disk, fileless malware resides in a computer’s volatile memory, making it more challenging to detect and analyze.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Command and Control

A

Refers to the communication and control infrastructure used by attackers to manage and direct compromise the devices or systems within a network. Associated with botnets, remote access Trojans(RATs), and other forms of malicious software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Bots

A

Refers to a software application that performs automated tasks. Can have both legitimate and malicious purposes, and are designed to interact with the computer systems or network in various ways.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cryptomalware

A

A type of malicious software design to encrypt a user’s files or even their entire system rendering their data inaccessible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Logic Bomb

A

A type of malicious software or code that is intentionally inserted into a program or system with the purpose of triggering a harmful event or action under specific conditions or at a predetermined time. Usually dormant.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Spyware

A

A type of malicious software that is designed to covertly observe and gather information about a user’s activities on a computer or device without their knowledge or consent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Keylogger/ Keystroke Loggers

A

A type of software or hardware designed to record and monitor the keystrokes made on a computer or mobile device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Remote access Trojan (RAT)

A

A type of malicious software that provides an attacker with unauthorized access and control over a compromised system. Remote access highlights the capability of these Trojans to allow attackers to control the infected system from a remote location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Rootkit

A

A type of malicious software designed to conceal the presence of certain processes or programs on an operating system allowing attackers to maintain unauthorized access to a computer or network while avoiding detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Backdoor

A

Prefers to a hidden or unauthorized means of accessing a computer system or software application. Back doors can be intentionally created by developers for legitimate reasons such as system maintenance but they can also be exploded by malicious actors for unauthorized access and control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly