2.4.4, 2.4.5, 2.4.6 Flashcards
What are viruses and worms?
Types of malware categorized by their ability to self-replicate.
What distinguishes viruses from worms?
Viruses require user interaction to spread, while worms can spread independently.
What is a characteristic of worms in terms of self-replication?
They do not need to rely on programs to spread.
How can viruses and worms affect a target?
By infecting specific programs on a computer.
By encrypting sensitive data on a local network.
By spreading to the boot sector of the computer.
What is a recommended defense against viruses?
Restricting the level of privilege users and processes natively run in.
What is a common defense measure against both viruses and worms?
Regularly updating antivirus software.
What is adware?
Software that installs extra components to deliver additional advertising, often in the form of pop-up ads.
How does adware affect computer performance?
It slows down computer performance by increasing network traffic.
What is a common method of distributing adware?
Bundling it with free software downloads.
How is spyware different from adware?
Spyware monitors computer and internet usage.
What type of data does spyware typically monitor?
Website visit history and browsing habits.
What is bloatware?
Software that comes pre-installed on devices by manufacturers and consumes system resources.
Why do manufacturers pre-install bloatware on devices?
To generate additional revenue through partnerships with software developers.
What is a keylogger?
A software program that tracks and logs keystrokes on a victim’s keyboard.
Why are keystrokes valuable to attackers?
They contain data such as passwords, usernames, and credit card information.
How do keyloggers capture data other than individual keystrokes?
By taking screenshots, logging items copied to the clipboard, and capturing instant messages.
Why are keyloggers not affected by encryption protection?
Because they intercept keyboard inputs before encryption takes place.
What are some legitimate uses for keyloggers?
Monitoring a child’s online activity.
How did the FBI use a keylogger in an investigation against cybercriminals?
By capturing the suspects’ usernames and passwords.
How do keyloggers spread?
Through email attachments, instant messages, text messages, or visiting malicious websites.
What is a recommended defense against keyloggers when opening email attachments?
Use caution when opening attachments and consider using one-time passwords and multi-factor authentication.
How can password managers help protect against keyloggers?
By not requiring typing the saved password each time for access.
How can alternate keyboard layouts help defend against keyloggers?
By preventing keylogger software from capturing keystrokes.
What is a logic bomb?
A piece of code that waits for specific conditions to be met before executing.