Types Of Malware Reviewer Flashcards
a piece of code that spreads from one computer to another by attaching itself to other files.
Virus
that spreads from one computer to another on its own, not by attaching itself to another file like a virus.
Worm
an insidious type of malware that is itself a software attack and paves the way for a number of other types of attacks.
Trojan Horse
that sits dormant on a target computer until it is triggered by a specific event, such as a specific date
Logic Bombs
Data collected can include web browsing history, personal information, banking and other financial information, as well as usernames and passwords.
Spyware
software that automatically displays or downloads advertisements when it is used. Also, it can reduce user productivity by slowing down the systems and simply by creating annoyances.
Adware
often attempt to hide themselves from monitoring or detection and modify low-level system files when integrating themselves into a system
Rootkit
the messages can quickly fill a user’s inbox and cause storage issues; it can also carry malicious code and other types of malware.
Spam
is an IM internet messaging-based attack similar to spam that propagated through IM instead of through mail.
Spim
It usually displays a message stating that you must pay a fee or face some other penalty before you can access your files and computer again.
Ransomware
who are known to possess a good deal of wealth. It is also known as spear phishing.
Whaling
the attacker sends an email that seems to come from a respected bank or other financial institution.
Phishing
the goal is to extract personal, financial, or confidential information from the victim by using services such as the telephone system and IP-based voice messaging services (VOIP) as the communication medium.
Vishing / Voice Phishing
is intended to trick the user into performing undesirable actions, such as deleting important system files in an attempt to remove a virus. It could also be a scam to convince users to give up important information or money for an interesting offer.
Hoax
The goal is to pretend to be someone else for the purpose of identity concealment. Can occur IP addresses, MAC addresses, and email.
Spoofing