Section 2 Malware Flashcards
Software designed to infiltrate a computer system and possibly damage it without the user’s knowledge or consent.
Malware
Malicious code that runs on a machine without the user’s knowledge and infects the computer when executed.
Virus
Virus that is stored in the first sector of a hard drive and is loaded into memory upon boot up.
Boot sector
Virus embedded into a document and is executed when the document is opened by the user.
Macro
Virus that infects an executable or application.
Program
Virus that combines boot sector and program viruses to first attach itself to the boot sector and program viruses to first attach itself to the boot sector and system files before attacking other files on the computer.
Multipartite
Advanced version of an executed by altering the decryption module to avoid detection.
Polymorphic
Virus that is able to rewrite itself entirely before it attempts to infect a file
Metamorphic
Viruses that are using various different techniques to avoid detection by an antivirus software.
Stealth
Viruses that have a layer of protection to confuse a program or person analyzing it.
Armored
Tricks a user into infecting their own machine.
Hoax
A virus that encrypts its payload with the intention of making detecting the virus more difficult.
Encryption
Malicious software, like a virus, but is able to replicate itself without user interaction.
Worm
Malicious software that is disguised as a piece of harmless or desirable software.
Trojan Horse
Provides the attacker with remote control of a victim computer and is the most commonly used types of trojan.
Remote Access Trojan (RAT)