Types of Virus and Malware

studied byStudied by 1 person
0.0(0)
Get a hint
Hint

Computer Virus

1 / 27

flashcard set

Earn XP

Description and Tags

Terms and definitions from Course 1, Module 1

28 Terms

1

Computer Virus

Malicious code is written to Interfere with computer operations and cause damage to data & software.

New cards
2

Malware

Software designed to harm devices or networks.

New cards
3

Brain Virus

The virus was created by Pakistani brothers Amjad and Basit Farooq Alvi to track and stop illegal copies of their program, while also gauging piracy. The virus could sometimes destroy data, but it was not designed to corrupt data or spread chaos

New cards
4

Morris Worm

The worm sought out computers running a particular version of the UNIX operating system and spread rapidly by exploiting security flaws known by Morris and other skilled programmers.

New cards
5

Social Engineering

A manipulation technique that exploits human error to gain unauthorized access to sensitive, private, and/or valuable data

New cards
6

Love Letter Attack

In the year 2000, Onel De Guzman created the Love Letter malware to steal internet login credentials.

New cards
7

Phishing

It is the use of digital communications to trick people into revealing sensitive data or deploying malicious software.

New cards
8

The Equifax breach

In 2017, attackers successfully infiltrated the credit reporting agency, Equifax. This resulted in one of the largest known data breaches of sensitive information. Over 143 million customer records were stolen, and the breach affected approximately 40% of all Americans.

New cards
9

USB Baiting

An attack in which a threat actor strategically leaves a malware USB stick for an employee to find and unknowingly infect a network.

New cards
10

Watering Hole Attack

An attack in which a threat actor compromises a website frequently visited by a specific group of users

New cards
11

CSIRT

Computer Security Incident Response Teams

New cards
12

Business Email Compromise (BEC)

An attack in which a threat actor impersonates a known source to obtain a financial advantage

New cards
13

Ransomeware

A malicious attack during which threat actors encrypt an organization's data and demand payment to restore access

New cards
14

Virus

A malware program that modifies other computer programs by inserting its own code to damage and/or destroy data

New cards
15

Physical Social Engineering

An attack in which a threat actor impersonates an employee, customer, or vendor to obtain unauthorized access to a physical location

New cards
16

Vishing

The exploitation of electronic voice communication to obtain sensitive information or to impersonate a known source

New cards
17

Adversarial artificial intelligence (AI)

A technique that manipulates artificial intelligence (AI) and machine learning (ML) technology to conduct attacks more efficiently

New cards
18

Cryptographic attack

An attack that affects secure forms of communication between a sender and intended recipient

New cards
19

Hacker

Any person who uses computers to gain access to computer systems, networks, or data

New cards
20

Password attack

An attempt to access password secured devices, systems, networks, or data

New cards
21

Physical attack

A security incident that affects not only digital but also physical environments where the incident is deployed

New cards
22

Social media phishing

A type of attack where a threat actor collects detailed information about their target on social media sites before initiating the attack

New cards
23

Spear phishing

A malicious email attack targeting a specific user or group of users, appearing to originate from a trusted source

New cards
24

Supply-chain attack

An attack that targets systems, applications, hardware, and/or software to locate a vulnerability where malware can be deployed

New cards
25
New cards
26
New cards
27
New cards
28
New cards

Explore top notes

note Note
studied byStudied by 18 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 3 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 10 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 43 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 3 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 11 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 15 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 58 people
Updated ... ago
5.0 Stars(3)

Explore top flashcards

flashcards Flashcard40 terms
studied byStudied by 10 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard85 terms
studied byStudied by 8 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard62 terms
studied byStudied by 3 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard58 terms
studied byStudied by 35 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard34 terms
studied byStudied by 6 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard55 terms
studied byStudied by 7 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard84 terms
studied byStudied by 6 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard40 terms
studied byStudied by 27 people
Updated ... ago
5.0 Stars(8)