Type Of Attack Indicators Flashcards
Software that has been designed for some nefarious purpose. Such software can be designed to cause damage to a system, such as by deleting all files, or it can be designed to create a back door into the system to grant access to unauthorized individuals
Malware
Form of malware that locks the user out of their files, or even the entire device until an online Ransom payment is made to restore access 
Ransomware
A piece of software that appears to do one thing, and may, in fact actually do that thing, but hide some other functionality
Trojans
Acts like a virus, but also have the ability to travel without human action they do not need help to spread
Worms
A designation used by security companies and antivirus vendors to identify programs that may have adverse effects on a computer security and privacy. The software can exhibit some very undesired characteristics, such as the following, slowing down your computer, displaying a ton of annoying ads, adding toolbars that steal space on the browser, collecting private information
Potentially unwanted programs 
When a piece of malware operates only in memory, never touching the file system. It is much harder to tact. Memory based attack
File-less viruses
Servers that are used by hackers to control malware that has been launched against targets
Command and control
A functioning piece of software that performs some task under the control of another program 
Bots
The name of the security industry has given to malware that uses a systems resources to mine cryptocurrency
Crypto-Malware
A type of malicious software that is deliberately installed, generally by an authorized user. It is a piece of code that sits dormant for a period of time until summer event or date invokes the malicious payload 
Logic bombs
Software that spies on users, recording, and reporting on their activities 
Spyware
A piece of software, that logs, all of the key strokes how to user enters
Keylogger
A tool kit designed to provide the capability of covert surveillance, and or the capability to gain unauthorized access to a target system 
Remote-Access Trojans (RATs)
A form of malware that is specifically designed to modify the operation of the operating system in some fashion to facilitate non-standard functionality 
Rootkit
Originally, and sometimes still are nothing more than methods used by software developers to ensure that they can gain access to an application, even if something were to happen in the future to prevent normal access methods
Backdoors