Chapter 2 - Malware And Social Engineering Attacks Flashcards
Malware
Software that enters a computer system without the users knowledge or consent and then performs an unwanted and usually harmful action.
The four traits that a malware can possess
1) circulation
- viruses
- worms
2) infection
- Trojans
- ransomware
- crypto-malware
3) concealment
- rootkit
4) payload capabilities
Virus
Malicious computer code that reproduces itself on the same computer
Worm
A malicious program that uses a computer network to replicate.
Trojan
An executable program that is advertised as performing one activity but which also performs a malicious activity.
Remote access Trojan (RAT)
A Trojan that also gives the threat agent unauthorized remote access to the victims computer by using specially configured communication protocols.
Ransomware
Malware that prevents a users device from properly and fully functioning until a fee is paid.
Crypto-malware
Malware that encrypts all the files on the device so that they cannot be opened.
Rootkit
Malware that hides its presence or presence of other malware.
Spyware
Tracking software that is deployed without the consent or control of the user.
Keylogger
Spyware that silently captures and stores each keystroke that a user types on the computers keyboard.
Adware
A software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
Logic bomb
Computer code that lies dormant until it is triggered by a specific logical event.
Back door
Software code that gives access to a computer, program, or a service that circumvents any normal security protections.
Bot (zombie)
An infected computer that is under the remote control of an attacker for the purpose of launching attacks.