Prevent Malware And Security Threats (Chapter 8) Flashcards
Virus
Code designed to infect a computers files. When the file active
Types of Viruses
Macro
- targets Microsoft Office documents
Boot sector
- targets the boot sector info, partition table or file system
Firmware
- targets the firmware of a specific component
Program
- targets executable code of another program
Scripts
- targets automated OS functions
Worm
A type of virus that is self-contained that spreads through memory and network connection rather than effecting files
Trojan Horse
A malicious software program hidden within an in conspicuous piece of software
- often function as a back door to application
- can acts as a proxy for an attacker
Spyware
Software that records information about a PC and it’s users
Rootkit
A class of malware that modified system files often at the kernel level, to conceal it’s presence
Ransomware
Malware that tries to extort money from the victim by appearing to lock their computer or by encrypting their files
Anti-Virus software
Software capable of detecting and removing virus infections and other types of malware
Heuristic
Monitoring technique that allows dynamic pattern matching based on past experience rather than relying on pre-loaded signatures
Malware Removal
1) Identifies and research
2) Quarantine
- quarantine infected system
3) Disable
- disable system restore
4) Remediate
- scan and use removal techniques
5) Schedule
- schedule scans and run updates
6) Enable
- enable system restore
7) Educate