Security + Malware Flashcards

1
Q

Grayware

A

An application that may not carry any recognizable malware, **but which is nevertheless harmful or annoying to a user. **

Examples might include location tracking, web *browsing habit monitoring*, or delivery of unwanted advertising.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Adware

A

the term used for various pop-up advertisements that show up on your computer or mobile device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Ransomware

A

a type of malware that holds a victim’s sensitive data or device hostage, **threatening to keep it locked—or worse—unless the victim pays a ransom to the attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Spyware

A

a type of malware that collects your personal information and gathers data about you without your consent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Trojan horse

A

a type of malware that downloads onto a computer disguised as a legitimate program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Worm

A

a type of malware or malicious software that can replicate rapidly and spread across devices within a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

***PUP*** potentially unwanted program

A

PUP is a *potentially unwanted program *that is often installed when other software is installed on the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Backdoor

A

a malware type that negates normal authentication procedures to access a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Fileless virus

A

uses legitimate, otherwise benevolent programs to compromise your computer instead of malicious files.

works directly within a computer’s memory instead of the hard drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Rootkit

A

When used gain access to and infiltrate data from machines without being detected. It covers software toolboxes designed to infect computers, give the attacker remote control, and remain hidden for a long period of time.

` when a threat actor uses a rootkit to target a system`
** Firmware rootkits
Memory rootkits
User-mode rootkits
Bootloader rootkits
**

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Honeypot

A

a decoy used to protect a network from present or future attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Botnet

A

a network of computers infected by malware that are under the control of a single attacking party, known as the “bot-herder.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Keylogger

A

**a form of malware or hardware **that keeps track of and records your keystrokes as you type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cryptomalware

A

malware that encrypts data on the victim’s device and demands a ransom to restore it.

Crypto ransomware can attack both individuals and businesses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Command and control

A

allows threat actors to communicate with and control compromised devices over a network

the attack creates a covert link between the compromised system and a C&C server, which is a cybercriminal’s server
~~~

ALLOWS THEM TO
~~~
Send commands to malware
Distribute malicious programs and scripts
Receive stolen data from target servers, devices, websites, and forms

ALOWS THEM TO Send commands to malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly