Chapter 9 Flashcards
Software Exploitation
Attacks launched against applications and higher-level services. Includes gaining access to data using weaknesses
300
Rootkits
Software programs that have the ability to hide certain things from the operating system. Not all of the processes may show up in Task Manager
301
Bad extensions to download in an email
.bat .com .exe .hlp .pif .scr
Ransomware
Takes control of the system and demands that a third party be paid. Often gains control via encrypting the hard drive or changing passwords
309
Botnet
Malicious software running on a zombie computer. Generally run in the background of your computer with no visible evidence of their presence
309
Means of spreading Viruses
- On contaminated media (DVD, USB)
- Through email and social networking sites
- As part of another program
310
Polymorphic Virus
Change their form to avoid detection
310
Stealth Virus
Avoid detection by masking themselves from applications. They usually hide at the end of a boot section
310
Retroviruses
Attack or bypass the antivirus software installed on a computer
310
Multipartite Virus
Attack your system in multiple ways
310
Armored Virus
Designed to make itself difficult to detect or analyze
310
Companion Virus
Attaches itself to legitimate programs and then creates a program with a different filename extension
310
Phage Virus
Modifies and alters programs in databases
310
Macro Virus
Exploits enhansements made to many application programs, which are used by programmers to expand the capability of applications
310
Common Symptoms of Viruses
Programs take longer to load
Unusual files appear on your hard drive
Program sizes change
Software exhibits unusual characteristics
System mysteriously shuts down or unexpected disk activity
Suddenly can access disk drive or other system resources
System will not reboot or gives unexpected error messages during startup
311