Chapter 9: Malware, Vulnerabilities and Threats Flashcards
Spyware
- Monitors user activity and reports it to another party
- Does not replicate
Rootkits
Software programs that have the ability to hide certain things from the OS
Command to display running processes in Linux
ps -ef | more
Common file extensions that should not be allowed in your network
.bat .com .exe .hlp .pif .scr
Logic Bombs
Programs or code snippets that execute when a certain predefined event occurs.
Botnet
Malicious software running on a zombie and under the control of a bot-herder
Ransomware
Software takes control of a system and demands that a third party be paid.
3 Ways a Virus can enter your computer
1) Contaminated media (DVD, USB, CD)
2) Email or social networking sites
3) As part of another program
Retrovirus
Attak or bypass the antivirus software installed on a computer
Multipartite virus
Attacks your system in multiple ways
Armored Virus
Difficult to detect or analyze
Companion Virus
Attaches itself to legitimate programs and then creates a program with a different filename extension.
Phage
Modifies and alters other programs and databases.
Macro
Exploits the enhancements made to many application programs
SPIM and SPIT
Spam over instant messaging, and spam over Internet telephony.
Ping of Death
Crashes the system by sending ICMP packets that are larger than the system can handle.
Pharming
Traffic intended for one host is sent to another, with the intent of pretty much phishing