Malware Types and social engineering techniques Flashcards
Viruses and Worms
Types of malicious software (malware) that can replicate themselves and spread across a network.
Virus- needs a host file or program to spread
Worm- can spread independently by actively searching for vulnerable systems on the network to infect
Adware/Spyware
Adware- “adware” is a type of malware that displays unwanted advertisements
Spyware- secretly monitors a user’s activity and collects personal information without their knowledge
Rootkit
a type of malware designed to give hackers access to and control over a target device
Botnet
a network of private computers infected with malicious software and controlled as a group without the owners’ knowledge, e.g., to send spam messages.
Keylogger
a computer program that records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information
Ransomware
a type of malicious software designed to block access to a computer system until a sum of money is paid.
Trojan
a type of malware that disguises itself as a legitimate program or file to gain access to a device
Antivirus and anti-malware
Antivirus and anti-malware are both computer programs that protect devices from malware.
Antivirus: Originally designed to detect and remove viruses, antivirus software scans for known malware patterns and removes or blocks suspicious activity.
Anti-Malware: Can detect and remove a wider range of malicious software, including viruses, spyware, and ransomware. Anti-malware uses techniques to detect new and more sophisticated malware strains.
Phishing
Uses fraudulent emails or websites to trick victims into sharing sensitive data.
Vishing
Uses voice calls or voicemails to trick victims into sharing sensitive data.
Whaling
Whaling attacks, often referred to as CEO fraud or executive phishing, are sophisticated cyberthreats targeting an organization’s high-profile individuals.
Shoulder Surfing
a social engineering attack where a person steals a victim’s personal information by looking over their shoulder or listening to them
Tailgating
a security breach that occurs when someone gains access to a restricted area by following an authorized person
Impersonation
a cyber security tactic where a malicious actor pretends to be someone else to steal data or funds
Dumpster Diving
a cybercrime where hackers search through trash to find sensitive information, such as bank statements, credit card numbers, or passwords