M1 Malware Flashcards
What is Malware?
Malware (Malicious Software) refers to any harmful program or file intentionally designed to damage or gain unauthorized access to a computer, network, or server.
Example types include keyloggers, trojans, ransomware, and rootkits.
What are common types of Malware?
- Keyloggers
- Trojans
- Ransomware
- Rootkits
What is a Keylogger?
Records keystrokes to capture sensitive data, such as passwords or bank information.
Forms include software keyloggers and hardware keyloggers.
What is a Trojan?
Malware disguised as a legitimate program to entice users to install it, giving attackers access to the system.
Common types include SMS Trojan, Backdoor Trojan, Ransom Trojan, Downloader Trojan, and Fake AV Trojan.
What is Ransomware?
Encrypts files and demands a ransom for decryption.
Infection methods include email phishing, website pop-ups, and drive-by downloads.
What is a Rootkit?
Malware that provides hidden, persistent access to a system for attackers.
Types include Firmware Rootkits, Bootloader Rootkits, Memory Rootkits, Application Rootkits, and Kernel Mode Rootkits.
What is a Virus?
Malware that replicates by infecting files or programs.
Examples include Creeper, Elk Cloner, and ILOVEYOU.
What is a Worm?
A type of malware that can self-replicate without needing a host program and spreads automatically, often causing network disruptions.
What is Phishing?
Fraudulent emails attempting to steal sensitive data or spread malware.
What is a Man-in-the-Middle (MitM) Attack?
Eavesdropping attacks where attackers intercept data between two parties.
What is a Denial-of-Service (DoS) Attack?
Overwhelms a system with traffic to prevent legitimate access.
What is SQL Injection?
Injects malicious code into SQL databases to access unauthorized data.
What is a Zero-Day Exploit?
Attacks a system vulnerability before it is patched.
What are common Cybersecurity Measures?
Antivirus Software
Firewalls
What are the types of Hackers?
Black Hat, White Hat, Gray Hat, Blue Hat, Red Hat