3. Malicious Code Flashcards

1
Q

Ransomware

A

Malware that takes over a computer and then demands a ransom.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Trojans/Trojan Horses

A

Type of Malware that is typically disguised as legitimate software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

RATs

A

Remote Access Trojans.

Designed to provide attackers with remote access and monitoring to systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Worms

A

Worms spread themselves. Worms self-install rather than requiring users to click on them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Rootkits

A

Malware that is specifically designed to allow attackers to access a system through a backdoor. Rootkit detection can be challenging,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Backdoors

A

Methods or tools that provide access that bypasses normal authentication and authorization procedures, allowing attackers to access systems, devices, or applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Bots

A

Remotely controlled systems or devices that have a malware infection. A group of bots is a botnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

C&C

A

Command and Control.

The core of a botnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Fast Flux DNS

A

Uses many IP addresses that are used to answer queries for one or more fully qualified DNS names.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Keyloggers

A

Programs that capture keystrokes from keyboards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Logic Bombs

A

Functions or code that are placed inside other programs that will activate when a specific date or set of conditions is met.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Virus

A

Malicious programs that self-copy and self-replicate. Viruses have a trigger, which sets the conditions for when the virus will execute, and a payload, which is what the virus does.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Fileless Virus

A

Similar to a traditional virus, but they inject themselves into memory and conduct further malicious activity. They don’t require local file storage because they remain memory resident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Spyware

A

Malware that is designed to obtain information about an individual, organization, or system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

PUPs

Definition & Examples

A

Potentially Unwanted Programs

Programs that may not be wanted by the user but are not as dangerous as other malware.

Examples: Adware, Browser Toolbars, Web Browser-Tracking programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Adversarial Artificial Intelligence

A

Developing field where artificial intelligence is used by attackers for malicious purposes. Currently tends to deal with data poisoning, providing security and analytic AI and ML algorithms with adversarial input that serves the attackers purpose.