Types of Malware Flashcards

1
Q

Ransomware

A
  • The bad guys want your money
  • They’ll take your computer in the meantime
  • May be a fake ransom
  • Locks your computer “by the police”

• The ransom may be avoided
• A security professional may be able to
remove these kinds of malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Crypto-malware

A
  • New generation of ransomware
  • Your data is unavailable until you provide cash
  • Malware encrypts your data files
  • Pictures, documents, music, movies, etc.
  • Your OS remains available
  • They want you running, but not working

• You must pay the bad guys to obtain the decryption
key
• Untraceable payment system
• An unfortunate use of public-key cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Trojan horse

A
  • Used by the Greeks to capture
  • Troy from the Trojans - A digital wooden horse
  • Software that pretends to be something else
  • So it can conquer your computer
  • Doesn’t really care much about replicating
  • Circumvents your existing security
  • Anti-virus may catch it when it runs
  • The better trojans are built to avoid and disable AV
  • Once it’s inside it has free reign
  • And it may open the gates for other programs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Spyware

A
  • Malware that spies on you
  • Advertising, identity theft, affiliate fraud
  • Can trick you into installing
  • Peer to peer, fake security software
  • Browser monitoring
  • Capture surfing habits
  • Keyloggers
  • Capture every keystroke
  • Send it back to the mother ship
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Keyloggers

A
  • Your keystrokes contain valuable information
  • Web site login URLs, passwords, email messages
  • Save all of your input
  • Send it to the bad guys
  • Circumvents encryption protections
  • Your keystrokes are in the clear

• Other data logging
• Clipboard logging, screen logging,
instant messaging, search engine queries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Rootkits

A
  • Originally a Unix technique
  • The “root” in rootkit

• Modifies core system files - Part of the kernel

  • Can be invisible to the operating system
  • Won’t see it in Task Manager
  • Also invisible to traditional anti-virus utilities
  • If you can’t see it, you can’t stop it
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Virus

A
  • Malware that can reproduce itself
  • It doesn’t need you to click anything
  • It needs you to execute a program
  • Reproduces through file systems or the network
  • Just running a program can spread a virus
  • May or may not cause problems
  • Some viruses are invisible, some are annoying
  • Anti-virus is very common
  • Thousands of new viruses every week
  • Is your signature file updated?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Virus types

A
  • Program viruses
  • It’s part of the application
  • Boot sector viruses
  • Who needs an OS?
  • Script viruses
  • Operating system and browser-based
  • Macro viruses
  • Common in Microsoft Office
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Worms

A
  • Malware that self-replicates
  • Doesn’t need you to do anything
  • Uses the network as a transmission medium
  • Self-propagates and spreads quickly
  • Worms are pretty bad things
  • Can take over many systems very quickly

• Firewalls and IDS/IPS can mitigate many worm
infestations
• Doesn’t help much once the worm gets inside

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Botnets

A
  • Robot networks
  • Skynet is self-aware
  • Once your machine is infected, it becomes a bot
  • You may not even know

• How does it get on your computer?
• Trojan Horse (I just saw a funny video of you! Click
here.)
or you run a program or click an ad you THOUGHT
was
legit, but…
• OS or application vulnerability

• A day in the life of a bot
• Sit around. Check in with the mother ship.
Wait for instructions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following enables troubleshooting a malware-infected system that doesn’t boot up?

A

Recovery console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following would be the best malware-prevention method/tool?

A

End user education

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following statements apply to the definition of a computer virus?

A

A self-replicating computer program containing malicious segmen

Requires its host application to be run to make the virus active

Attaches itself to an application program or other executable component

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A collection of software tools used by a hacker to mask intrusion and obtain administrator-level access to a computer or computer network is known as

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly