1.8.2 Malware Flashcards
Viruses and worms
Viruses:
Small pieces of code injected into other programs which spread from computer to computer.
Worms:
Small pieces of code which spread across a network, similar to viruses but without a host program.
Trojan horses and ransomware
Trojan horses:
Any form of malware which tricks the user into installing it by pretending to be a different program.
Ransomware:
Encrypts files on an infected system and only decrypts files once a payment has been made to the hacker.`
Spyware, rootkits and backdoors
Spyware:
Gathers information about a user by tracking their activity.
Rootkits:
Malware which modifies the computer’s operating system to avoid detection by antivirus software.
Backdoors:
Malware which opens up an access channel to a computer that other malware can use to take over the machine.
How Malware Spreads - Replication
Once one device on a network has been infected with a worm or a virus, then it becomes very easy for it to spread to other devices on the network.
The process of spreading to other computers is called self-replication.
How Malware Spreads - Attachments
Opening attachments in emails such as Word and Excel documents can include ‘macros’.
A macro is a small program that is given permission to run on the computer.
The macros can be set up to install malware.
How Malware Spreads
Users often willingly install malware if they are tricked into thinking that they are installing a different piece of software.
Common ‘disguises’ for malware include:
Security updates.
Software drivers.