Attack Types Flashcards
Overview of malware, virus and types of cyber attacks
Malicious software that will have a negative impact in your computer.
Malware
Malware that can reproduce itself but needs the user to click on or launch the application to start its process.
Virus
Malware that self-replicates itself and doesn’t need user intervention.
Worm
Type of malware that uses legitimate programs to infect a computer. It does not rely on files and leaves no footprint, making it hard to detect and remove.
Fileless Virus/Malware
Malware on your system that requires you to give money for the attackers to give access back to your computer.
Ransomware
Uses cryptography to be able to encrypt all your personal information unless you have the proper key by sending bitcoin/money to your attackers.
Crypto-malware
Software that pretends to be something else. Doesn’t care about replicating.
Trojan Horse
Unwanted program commonly downloaded by a Trojan Horse software.
PUP (Potentially Unwanted Program
Way to easily reconnect back with an infected system. Created by the malware itself and can be used by multiple types of malware on the same system.
Backdoors
Remote administration tool that gives 3rd parties access to your computer to have almost complete control over your computer.
RATs - Remote Access Trojan
Can be found on any OS and modify files in the kernel of the OS. Can be invisible to the OS and antivirus software.
Rootkits
Malware that throws advertisement all over your computer. Pop-ups, with pop-ups. Can be installed accidentally.
Adware
Malware that spies on you.
Spyware
Type of spyware that captures every keystroke you type
Keyloggers
Stands for robot, term to describe the automation that occurs BTS when your system is taken over by this type of malware.
Bots