Malware Types Flashcards
Virus
A piece of code that spreads from one device to another by attaching itself to other files.
Worm
A piece of code that spreads from one device to another without attaching itself to another file. Often they pave the way for other attacks, send data to the attacker or corrupt or destroy data.
Tojan horse
A software attack that paves the way for other attacks. Social engineering is involved, since the user must be tricked into running the Trojan horse software
Logic bomb
Apiece of code that sits dormant on a target device until it is triggered by a specific event, such as a date. Detonates and executes programmed action of the target system
Spyware
Surreptitiously installed malicious software that tracks and reports the usage of a target system or collect data
Adware
Software that automatically displays or downloads advertisements when it is used
Ransomware
Example: Cryptolocker
Malicious code that restricts access to a user’s device or data store on it until the victim pays the attacker. Implemented by Trojan horse usually
Rootkit
Code that takes control of a system at the lowest levels. Hides from monitoring or detection. Modify low-level system files
Spam
Spam is an email-based threat that presents ad materials, promotional content or get-rich-quick schemes.