1.2 Types of Attacks Flashcards
What is Malware?
Malware, short for malicious software, is a blanket term for viruses, worms, trojans, and other harmful computer programs hackers use to wreak destruction and gain access to sensitive information.
What are the [4] steps of a Malware Attack?
- Delivery – How it gets to the target
- Propagation – How malware spreads
- Payload – What malware does once it’s there
- Indicators of Compromise (IoC) - An artifact observed on a network or in an operating system that with high confidence indicates a computer intrusion
Name [3] Examples of Types of Malware
- Trojans
- Ransomware
- Bots
- Spyware
- Keyloggers
- Remote Access Trojan (RAT)
- Potentially unwanted programs (PUPs)
- Rootkit
- Backdoor
What is Ransomware?
Software that enables an attacker to take control of a user’s system or data and to demand payment for the return of that control or files or documents stored on it
What impact does ransomware make?
- Locks the computer to prevent normal usage
- Encrypts the document and files on it to prevent access to saved data
How does ransomware spread?
It is usually installed when you open a malicious email attachment or click a malicious link in email, an instant message, or even if you visit a malicious website
How to prevent ransomware?
- Keep all of the software on your computer up-to-date
- Keep your firewall turned on
- Don’t open spam messages or click links on a suspicious website
What is a Trojan Horse?
A type of malware that hides on an infected system and can cause damage to the system or give an attacker a platform for monitoring and/or controlling a system
- Not self-replicating
- Not attacked to other files
- Malicious content in a benign package