1.2 Types of Attacks Flashcards

1
Q

What is Malware?

A

Malware, short for malicious software, is a blanket term for viruses, worms, trojans, and other harmful computer programs hackers use to wreak destruction and gain access to sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the [4] steps of a Malware Attack?

A
  • Delivery – How it gets to the target
  • Propagation – How malware spreads
  • Payload – What malware does once it’s there
  • Indicators of Compromise (IoC) - An artifact observed on a network or in an operating system that with high confidence indicates a computer intrusion
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name [3] Examples of Types of Malware

A
  • Trojans
  • Ransomware
  • Bots
  • Spyware
  • Keyloggers
  • Remote Access Trojan (RAT)
  • Potentially unwanted programs (PUPs)
  • Rootkit
  • Backdoor
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Ransomware?

A

Software that enables an attacker to take control of a user’s system or data and to demand payment for the return of that control or files or documents stored on it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What impact does ransomware make?

A
  • Locks the computer to prevent normal usage

- Encrypts the document and files on it to prevent access to saved data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does ransomware spread?

A

It is usually installed when you open a malicious email attachment or click a malicious link in email, an instant message, or even if you visit a malicious website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How to prevent ransomware?

A
  • Keep all of the software on your computer up-to-date
  • Keep your firewall turned on
  • Don’t open spam messages or click links on a suspicious website
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a Trojan Horse?

A

A type of malware that hides on an infected system and can cause damage to the system or give an attacker a platform for monitoring and/or controlling a system

  • Not self-replicating
  • Not attacked to other files
  • Malicious content in a benign package
How well did you know this?
1
Not at all
2
3
4
5
Perfectly