2.4.1, 2.4.2, 2.4.3 Flashcards
What is a Trojan horse in the context of cybersecurity?
Malicious software disguised as harmless or legitimate software
What is the significance of the term “Trojan Horse” in cybersecurity?
It symbolizes deceptive tactics used by hackers to gain unauthorized access
How do Trojan horses typically enter a victim’s computer?
Via email attachments or free downloads
What distinguishes a Trojan horse from a computer virus?
A trojan horse requires human assistance to propagate
What is a backdoor in the context of cybersecurity?
A mans to accessing a system or data bypassing normal security controls
What is a Remote Access Trojan (RAT)?
A trojan horse with a backdoor allowing for remote control of the infected host
What can a hacker do once a Remote Access Trojan (RAT) is installed on a victim’s computer?
Control the computer remotely and perform various actions such as viewing files and taking screenshots
What is the purpose of a Downloader Trojan?
To download and install additional malware onto an already infected computer
How does a Distributed Denial of Service (DDoS) Trojan function?
By flooding a network with traffic from infected computers to overwhelm and disrupt its normal functioning
What is a recommended defense against Trojan horse attacks?
Regularly update antivirus and security software, and avoid downloading or running unknown or untrusted software
Which of the following is a characteristic of viruses?
They can self-replicate
What is the distinguishing feature of crypto-malware?
It utilizes CPU cycles to generate encryption keys
What differentiates ransomware from other forms of crypto-malware?
It holds victim’s information for ransom
What is the primary characteristic of trojan malware?
It utilizes authorized programs to subvert system defenses
What distinguishes worms from viruses?
They can self-replicate without relying on programs