Threats, Attacks and Vulnerabilities - Malware Types Flashcards
Malicious code that attaches itself to a host application. The host application must be executed to run, and the malicious code executes when the host application is executed.
Virus
Self-replicating malware that travels throughout a network without the assistance of a host application or user interaction.
Worm
A string of code embedded into an application or script that will execute in response to an event.
Logic bomb
Provides another way of accessing a system.
Backdoor
Appears to be something useful but includes a malicious component, such as installing a backdoor on a user’s system.
Trojan
A type of malware that allows attackers to take control of systems from remote locations and often delivered via drive-by downloads.
RATs
A specific type of Trojan where attackers encrypt the user’s data or take control of the computer and lock out the user.
Ransomware
A type of malware that attempts to capture a user’s keystrokes.
Keylogger
Software that is installed on users’ systems without their awareness or consent to monitor the user’s computer and the user’s activity.
Spyware
Multiple computers that act as software robots (bots) and function together in a network (such as the Internet), often for malicious purposes.
Botnet
A group of programs (or, in rare instances, a single program) that hides the fact that the system has been infected or compromised by malicious code.
Rootkits