2.4.1, 2.4.2, 2.4.3 Flashcards
What is a Trojan horse in the context of cybersecurity?
Malicious software disguised as harmless or legitimate software
What is the significance of the term “Trojan Horse” in cybersecurity?
It symbolizes deceptive tactics used by hackers to gain unauthorized access
How do Trojan horses typically enter a victim’s computer?
Via email attachments or free downloads
What distinguishes a Trojan horse from a computer virus?
A trojan horse requires human assistance to propagate
What is a backdoor in the context of cybersecurity?
A mans to accessing a system or data bypassing normal security controls
What is a Remote Access Trojan (RAT)?
A trojan horse with a backdoor allowing for remote control of the infected host
What can a hacker do once a Remote Access Trojan (RAT) is installed on a victim’s computer?
Control the computer remotely and perform various actions such as viewing files and taking screenshots
What is the purpose of a Downloader Trojan?
To download and install additional malware onto an already infected computer
How does a Distributed Denial of Service (DDoS) Trojan function?
By flooding a network with traffic from infected computers to overwhelm and disrupt its normal functioning
What is a recommended defense against Trojan horse attacks?
Regularly update antivirus and security software, and avoid downloading or running unknown or untrusted software
Which of the following is a characteristic of viruses?
They can self-replicate
What is the distinguishing feature of crypto-malware?
It utilizes CPU cycles to generate encryption keys
What differentiates ransomware from other forms of crypto-malware?
It holds victim’s information for ransom
What is the primary characteristic of trojan malware?
It utilizes authorized programs to subvert system defenses
What distinguishes worms from viruses?
They can self-replicate without relying on programs
What is the primary function of spyware?
To listen to user activity without permission
What are bloatware applications primarily used for?
To slow down devices and take up space
What is the purpose of a keylogger?
To record user’s keystrokes to glean information
What is the defining characteristic of bots in the context of malware?
They autonomously act on actions typically sent from a Command and Control center
What is the primary function of a rootkit?
To gain administrative credentials on a system
What is ransomware?
Malicious software that encrypt and locks a victim’s data and demands a ransom
What type of data is commonly targeted by ransomware attackers?
Personal finance data
Which term describes a version of ransomware that encrypts files but demands payment in cryptocurrency?
Cryptomalware
How did the attackers demand payment from Baltimore City’s governmental computer systems in the RobbinHood ransomware attack?
Cryptocurrency (bitcoin)
What is the best defense against ransomware according to the text?
Prevention and data backups
What is scareware?
Software that creates fake antivirus alerts and demands payment
What is the main reason ransomware is profitable for cybercriminals?
Victims often pay the ransom
What is the purpose of doxware?
To threaten to release stolen data if a ransom is not paid
What is one consequence of paying the ransom according to the text?
The cybercriminal releases the victim’s data publicly
What is recommended to defend against ransomware attacks?
Regularly update software and keep backups of data