Chapter 03: Malicious Code Flashcards
______ describes a wide range of software that is intentionally designed to cause harm to systems and devices, networks, or users. It can also gather info provide illicit access, and take a broad range of actions that the legitimate owner of a system or network may not want to occur.
Malware
_____ is malware that takes over a computer and then demands a ransom.
Ransomware
Defense against ransomware.
Effective backup system that stores files in a separate location that will not be impact if the system or device it backs up is infected and encrypted by ransomware.
crypto malware is an example of ______.
Ransomware
_____ are a type of malware that is typically disguised as legitimate software.
Trojans
______ provide attackers with remote access to systems.
Remote Access Trojans
Defense against Trojans
Security Awareness training
True or False: Every Trojan is a Remote Access Trojan.
False. A Remote Access Trojan is a subject of a Trojan. But, not every Trojan is a remote access Trojan.
____ are self-install and spread themselves.
Worms
Stuxnet is an example of a ___.
Worm
_______ are malware that is specifically designed to allow attackers to access a system through a backdoor.
Rootkits
What are the ways to detect a rootkit on a computer?
- Testing the suspected system from a trusted system or device.
- Rootkit detection tools
What is a common recommendation for removing rootkits?
Restore from a good last known backup
_____ are methods or tools that provide access that bypasses normal authentication and authorization procedures, allowing attackers access to systems, devices, or applications.
Backdoor
Detection for backdoors.
- Unexpected ports
- Unexpected services
Note: More advanced backdoors may be leveraging existing services.