Malware overview Flashcards
Ransomware
Malware that restricts access to a victim’s computer system until a ransom is received
Type of Malware that uses a vulnerability in your software to gain access and then encrypt your files
Ransomware
Sypyware
Malware that secretly gathers information about the user without their consent
Keylogger
Type of spyware that captures Keystrokes made by the victim and takes screenshots that are sent to the attacker
Adware
Type of spyware that displays advertisements based on the information the spyware has gathered on you
Grayware
Malware that isn’t benign nor malicious and tends to behave improperly without serious consequence
Rootkit
Software designed to gain admin level control over a system without detection
DLL INJECTION
A method commonly used in root kits that is inserted into a running windows machine by taking advantages of Dynamic Link Libraries (DLL) that are loaded during run times
Driver Manipulation
A method commonly used in root kits that relies on compromising the kernel-mode device drivers that operate at a privileged or system level
shim
root kit that is placed between two components to intercept calls and redirect them
At what point in the start up are root kits activated
before the operating system boots
What is the best way to detect a root kit
Boot from an external device and than scan the internal hard drive
Spam
activity that abuses electronic messaging systems, most commonly through email
Virus
Code that infects a computer when a file is opened or executed
requires a user action like opening a file, clicking an exe, or downloading a program
Worm
a virus that can self replicate