Cyber Security - Malware Flashcards
What is cyber security?
The aim to protect networks, data and computers against damage, cyber attack and unauthorised access
Who can cyber attack target and why?
Individuals, organisations and even governments - to access lots of sensitive information
What is malware?
Code that is designed to cause harm or gain unauthorised access to a computer system - usually without someone’s consent or knowledge
How is malware usually installed on devices?
Downloaded in an email attachment
Hidden in USB drive (removable media)
Hidden on SD card (removable media)
What is removable media?
Devices that can store information such as a USB drive or SD card
What are typical actions of malware?
Deleting or modifying files
Locking files - ransomware
Displaying unwanted adverts that cannot be closed - adware
Monitoring the user - spyware
Altering permissions - give hackers administrator-level access to devices - rootkits
What is ransomware?
Malware that encrypts all the files on a computer with the hacker demanding a large sum of money to be paid in exchange for a decryption key
What is adware?
Malware thia displays adverts or pop-ups that can’t be closed
What is spyware?
Malware that secretly tracks what the user does, allowing the hacker to potentially work out passwords or bank details
What are rootkits?
Malware that can give hackers administer-level access to devices
What are the different ways that malware can spread between devices?
Viruses
Worms
Trojans
How do viruses spread between devices?
Viruses attach themselves to certain files
User spread them by copying the infected files
Users activate them by opening the infected files
What are worms?
They are like viruses but self-replicate without user help - spread quickly and exploit weak network security
What are trojans?
Malware disguised as legitimate software - don’t replicate - users install them without realising their hidden purpose
What is pharming?
When the user is directed to a fake version of a website that looks just like the real thing, with the aim the user can’t tell the difference