Security + Malware Flashcards
Grayware
An application that may not carry any recognizable malware, **but which is nevertheless harmful or annoying to a user. **
Examples might include location tracking
, web *browsing habit monitoring*
, or delivery of unwanted advertising.
Adware
the term used for various pop-up advertisements that show up on your computer or mobile device
Ransomware
a type of malware that holds a victim’s sensitive data or device hostage, **threatening to keep it locked—or worse—
unless the victim pays a ransom to the attacker.
Spyware
a type of malware that collects your personal information and gathers data about you without your consent.
Trojan horse
a type of malware that downloads onto a computer disguised as a legitimate program
Worm
a type of malware or malicious software that can replicate rapidly
and spread across devices within a network
***PUP***
potentially unwanted program
PUP
is a *potentially unwanted program *that is often installed when other software is installed on the computer.
Backdoor
a malware type that negates normal authentication procedures to access a system.
Fileless virus
uses legitimate, otherwise benevolent programs to compromise your computer instead of malicious files.
works directly within a computer’s memory instead of the hard drive
Rootkit
When used gain access to and infiltrate data
from machines without being detected. It covers software toolboxes designed to infect computers, give the attacker remote control, and remain hidden for a long period of time.
` when a threat actor uses a rootkit to target a system`
** Firmware rootkits
Memory rootkits
User-mode rootkits
Bootloader rootkits
**
Honeypot
a decoy used to protect a network from present or future attacks.
Botnet
a network of computers infected by malware that are under the control of a single attacking party
, known as the “bot-herder.”
Keylogger
**a form of malware or hardware **that keeps track of and records your keystrokes as you type
Cryptomalware
malware that encrypts data
on the victim’s device and demands a ransom to restore it
.
Crypto ransomware can attack both individuals and businesses.
Command and control
allows threat actors to communicate with and control compromised devices over a network
the attack creates a covert link between the compromised system and a C&C server
, which is a cybercriminal’s server
~~~
ALLOWS THEM TO
~~~
Send commands to malware
Distribute malicious programs and scripts
Receive stolen data from target servers, devices, websites, and forms
ALOWS THEM TO Send commands to malware