Chapter 2- Type of Attack Indicators Flashcards
Malware
harmful software
Virus
Malware that can reproduce itself
Fileless virus
a piece of malware that operates only in the memory of the computer
Worms
malware that self replicates and spreads quickly
Ransomware
a form of malware that locks the user out of their files or device until a payment is made
Crypto-malware
uses cryptography to encrypt personal information until the victim sends the attacker crypto to decrypt your data.
Trojan
software that pretends to be something else
PUP (Potentially Unwanted Program)
undesirable software; unwanted software that can cause performance problems
Backdoors
malware that is used to create a new way to get into the system
Remote Access Trojans (RATs)
a remote access tool that gives a third party access to your computer remotely and has complete control over your OS
Rootkit
A set of software tools (malware)that enable an unauthorized user to gain control of a computer system without being detected.
What are the five types of rootkits?
firmware, virtual, kernel, library and application level
Spyware
Malware that spies on you
Keyloggers
a piece of software that logs all of the keystrokes that a user enters
Bot
is an automated software application that performs repetitive tasks over a network