Cyber Security - Malware Flashcards
What is cyber security?
The aim to protect networks, data and computers against damage, cyber attack and unauthorised access
Who can cyber attack target and why?
Individuals, organisations and even governments - to access lots of sensitive information
What is malware?
Code that is designed to cause harm or gain unauthorised access to a computer system - usually without someone’s consent or knowledge
How is malware usually installed on devices?
Downloaded in an email attachment
Hidden in USB drive (removable media)
Hidden on SD card (removable media)
What is removable media?
Devices that can store information such as a USB drive or SD card
What are typical actions of malware?
Deleting or modifying files
Locking files - ransomware
Displaying unwanted adverts that cannot be closed - adware
Monitoring the user - spyware
Altering permissions - give hackers administrator-level access to devices - rootkits
What is ransomware?
Malware that encrypts all the files on a computer with the hacker demanding a large sum of money to be paid in exchange for a decryption key
What is adware?
Malware thia displays adverts or pop-ups that can’t be closed
What is spyware?
Malware that secretly tracks what the user does, allowing the hacker to potentially work out passwords or bank details
What are rootkits?
Malware that can give hackers administer-level access to devices
What are the different ways that malware can spread between devices?
Viruses
Worms
Trojans
How do viruses spread between devices?
Viruses attach themselves to certain files
User spread them by copying the infected files
Users activate them by opening the infected files
What are worms?
They are like viruses but self-replicate without user help - spread quickly and exploit weak network security
What are trojans?
Malware disguised as legitimate software - don’t replicate - users install them without realising their hidden purpose
What is pharming?
When the user is directed to a fake version of a website that looks just like the real thing, with the aim the user can’t tell the difference
What is the aim of pharming?
When the user inputs their personal information, they are handing it to the criminals who can then access their genuine account
How is pharming usually carried?
Using malware that automatically redirects people from legitimate sites to fake ones
How can you prevent pharming?
Ensuring anti-malware software is up to date
Using web filters to prevent users from accessing fake websites