Malicious Software Flashcards
_______ mechanisms include those used by viruses, worms, and Trojans.
Propagate (to spread)
______ include system corruption, bots, phishing, spyware, and rootlets.
Payload
A ______ _____ uses multiple methods of infection or propagation, to maximize the speed of contagion that and the severity of the attack.
blended attack
Virus creation toolkits that were developed in the 1990s to improve the development and deployment of malware.
crimeware
What does APT stand for?
Advanced
Persistent
Threats
_____ differ from other types of attack by their careful target selection, and persistent, then stealthy, intrusion efforts over extended periods.
APTs
What are the three parts of a computer virus?
Infection Mechanism(infection vector)
Trigger(logic bomb)
Payload
The means by which a virus spreads or propagates, enabling it to replicate.
Infection Mechanism (infection vector)
The even or condition that determines when the payload is activated or delivered.
Trigger (logic bomb)
What the virus does, besides spreading. The ___ may involve damage or may involve benign but noticeable activity.
Payload
What are the four phases that a typical virus goes through during its lifetime.
Dormant phase
Propagation phase
Triggering phase
Execution phase
The virus is idle. The virus will eventually be activated by some event, such as a date, the presence of another program or file, or the capacity of the disk exceeding some limit. Not all viruses have this stage.
Dormant phase
The virus places a copy of itself into other programs or into certain system areas on the disk. The copy may not be identical to the propagating version; viruses often morph to evade detection. Each infected program will now contain a clone of the virus, which will itself enter a ________ phase.
Propagation phase
The virus is activated to perform the function for which it was intended. As with the dormant phase, the ______ phase can be caused by a variety of systems events, including a count of the number of times that this copy of the virus has made copies of itself.
Triggering phase
The function is performed. The function may be harmless, such as a message on the screen, or damaging, such as the destruction of programs and data files.
Execution phase
Infects a master boot record or boot record and spread when a system is booted from the disk containing the virus.
Boot sector infector
Infects files that the operating system or shell consider to be executable
File infector
Infests files with macro or scripting code that is interpreted by an application
Macro virus
Infects files in multiple ways. Typically, the ________ virus is capable of infecting multiple types of files, so that virus eradication must deal with all of the possible sites of infection.
Multipartite virus