2.3 Detect, Remove, & Prevent Malware Using the Appropriate Tools & Methods Flashcards
Malware - Trojan
A digital wooden horse, software that appears to be one thing but is malware
Malware - Rootkit
Imbed deep in the OS, hard to see
Malware - Virus
Malware that can reproduce itself
Malware - Spyware
Malware that spies on you
Malware - Ransomware
Malware that encrypts your personal data
Malware - Keylogger
Spyware that tracks keystrokes
Malware - Boot Sector Virus
Virus becomes part of the boot sector when you reboot your system
Malware - Cryptominers
Uses your CPU to cryptomine
Tools & Methods - Recovery mode
Command line access to all files in OS, very powerful & dangerous
Tools & Methods - Antivirus
Protect against viruses
Tools & Methods - Anti-malware
Protect against malware
Tools & Methods - Software firewalls
Prevent malware from inbound or outbound communications
Tools & Methods - Anti-phishing training
Gain personal information from users, fake phishing emails to test users
Tools & Methods - User education regarding common threats
Company provides training to users
Tools & Methods - OS reinstallation
Delete everything then reinstall from a “good” back up