Section 14.7 Malware Protection Flashcards
Virus
Self-replicating malware that attaches in a legitimate program and hides there.
When the program runs, the virus payload is also executed.
Boot-sector virus
A virus that injects itself in the boot sector and moves the Master Boot Record to another location on the hard drive. The virus then always executes before the MBR.
Trojan horse
Malware that provides a hacker covert remote access to the victim’s system.
Spyware
Malware that monitors and logs a user’s activity on the device. This includes web browsing, applications, instant messaging, etc.
Ransomware
Malware that scans the system for user files and encrypts them. To regain access to files, the victim must pay a ransom.
Cryptominer
Malware that uses the victim computer’s resources to mine for cryptocurrency on behalf of the hacker.
Rootkit
Malware that consists of programs that can give the hacker root (administrator) access to the target machine.
Malware definitions
A unique fingerprint for each discovered malware. Anti-malware programs keep a database of definitions to detect and remove malware.
Sheep-dip computer
A special computer that is setup for malware analysis and remediation.
Keylogger
Malware that logs every keystroke the user makes and then sends the report back to the hacker.
Windows Pre-Installation Environment (WinPE)
A lightweight version of Windows that boots from the USB drive and is typically used to help deploy Windows in an enterprise environment or for troubleshooting Windows issues.
What is malware and how do I keep from getting it?
Malware is harmful software. Avoid it by not clicking on strange links, downloading from trusted sources, and using security software.
Why is a rootkit so dangerous to a PC?
Why is a rootkit so dangerous to a PC?
A rootkit hides deep in your computer, making it hard to detect and letting hackers control your PC.
What is the difference between a virus and a Trojan horse?
What is the difference between a virus and a Trojan horse?
A virus spreads by attaching to files. A Trojan horse looks safe but does harm when opened.
How can Windows Defender help me with malware?
What are some ways you can remove malware from a system?
Use antivirus software, run a scan, delete bad files, or reset the computer to a safe state.