Other Malware Types 2.4 Flashcards
1
Q
Keyloggers
A
- A piece of software that logs all the keystrokes a user enters on their keyboard
- Not all keyloggers are malicious
2
Q
Malicious Keyloggers
A
- Unknown to the user
- Not under the user’s control
- Circumvents encryption protections
3
Q
Keyloggers Other Data Logging
A
- Clipboard logging
- Screen logging
-Instant messages - Search engine queries
4
Q
Logic Bomb
A
- Waits for a predefined event or timeframe to invoke malicious payload
- Difficult to detect
- Has code that has not been seen before on other systems
5
Q
Preventing Logic Bombs
A
- Implement processes and procedures that limit the change to a system.
- Set up monitoring that alerts when a change has been implemented.
- Constant monitoring of who has access to what systems
6
Q
Rootkits
A
- Malware
- Modifies core system files
- Invisible to the operating system
- Invisible to antirvus software
7
Q
Removing Rootkits
A
- Use a anti-malware scan to look for the unusual
- Use a remover specific to the rootkit
8
Q
Boot Security/Unified Extensible Fireware Interface (UEFI)
A
- Blocks malware that attempts to alter the boot process
- Attests the drivers and OS have not been changed