1b - How External Threats Function Flashcards
List the types of malware
Spyware, adware, ransomware, viruses, worms, rootkits, trojans
What does spyware do?
gathers information and data from the device it has infected and sends it away, done with keylogger.
What does adware do?
displays advertisements used to generate revenue, often with pop-ups.
What does ransomware do?
Prevents a user accessing their system, often by encrypting files. Demands a sum of money to unencrypt data.
What do viruses do?
Viruses modify existing programs with malicious code, and constantly replicate throughout a computer, they usually corrupt data and utilise system performance.
What do worms do?
Worms are similar to viruses, however, they can replicate through networks instead of shared files.
What do rootkits do?
Rootkits are used to get unauthorised remote administrator access to a computer or network.
What do trojans do?
Trojans are malicious code disguised as a regular program. Often accidentally downloaded by the user.
What is meant by heuristic analysis.
Heuristic analysis is often done by an antivirus and scans a program for irregular commands or instructions.
What is signature based analysis?
Signature based analysis scans a program against a repository of static signatures. These signatures are often found in packet headers or data contents.
Generally define hacking.
Hacking is a term that describes the exploitation of vulnerabilities in a computer system in order to gain unauthorised access.
Define attack vector.
An attack vector is the path or method that an attacker takes to gain unauthorised access to a system or data. Often used to deliver payloads.
Define white hat hacking.
Authorised hacking in order to uncover weaknesses in a system.
Why do governments and companies hack?
evaluate their own weaknesses, profit, gather information (corporate espionage)
Define the plan-do-check-act loop.
PDCA provides a simple and effective way of testing for improvement on a small scale before updating procedures and working practices.