Chapter 6- Malicious Software

0.0(0)
studied byStudied by 2 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/40

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

41 Terms

1
New cards

Malware

Software intentionally designed to damage, disrupt, steal, or gain unauthorized access to computer systems.

2
New cards

Three main goals of malware

Confidentiality, integrity, and availability.

3
New cards

Adware

Displays unwanted ads.

4
New cards

Spyware

Secretly collects user data.

5
New cards

Advanced Persistent Threat (APT)

A long-term, targeted, and often state-sponsored cyberattack using multiple intrusion techniques against specific organizations.

6
New cards

Why APTs are dangerous

They are well-funded, persistent, stealthy, and target high-value information over extended periods.

7
New cards

Attack kits

Tools that allow even unskilled users to create and deploy malware, increasing attack volume and variety.

8
New cards

Examples of attack kits

Zeus and Angler.

9
New cards

Virus

Malicious code that attaches to executable files and replicates when those files run.

10
New cards

Three main components of a virus

Infection mechanism, trigger, and payload.

11
New cards

Macro virus

Infects document macros instead of executables and spreads through documents.

12
New cards

Worm

Self-replicating malware that spreads automatically across networks, often exploiting software vulnerabilities.

13
New cards

Morris Worm (1988)

One of the first major Internet worms, disrupting thousands of UNIX systems and highlighting network vulnerability.

14
New cards

WannaCry worm (2017)

Encrypted user files and demanded ransom payments using Bitcoin; spread through SMB vulnerabilities.

15
New cards

Mobile code

Executable code (like JavaScript or ActiveX) sent over the internet that can run on local systems, often used for exploits.

16
New cards

Drive-by download

Malware that installs automatically when a user visits a compromised or malicious website.

17
New cards

Watering-hole attacks

Target victims by compromising legitimate websites that specific groups of users are likely to visit.

18
New cards

Malvertising

Using online ads containing hidden malware that infects visitors without compromising the host website.

19
New cards

Clickjacking

Tricking users into clicking invisible or disguised elements that execute unwanted actions.

20
New cards

Social engineering in cybersecurity

Manipulating people into performing actions or revealing confidential information to aid attacks.

21
New cards

Trojan horse

A seemingly legitimate program that hides malicious functionality to compromise the system.

22
New cards

Ransomware

Malware that encrypts a victim's data and demands payment for decryption.

23
New cards

WannaCry

It combined ransomware with worm-like propagation, spreading automatically between vulnerable systems.

24
New cards

Logic bomb

Executes malicious actions when specific conditions or dates are met.

25
New cards

Botnet

A network of infected computers controlled remotely to launch coordinated attacks or perform automated tasks.

26
New cards

Difference between worm and bot

Worms self-activate and spread automatically; bots are controlled remotely via command-and-control systems.

27
New cards

Keylogger

Capturing keystrokes to steal sensitive information like passwords or credit card numbers.

28
New cards

Phishing

By sending fake messages or links impersonating trusted sources to trick users into revealing credentials.

29
New cards

Spear-phishing

A targeted form of phishing customized for specific individuals or organizations.

30
New cards

Backdoor (trapdoor)

A hidden access method allowing attackers to bypass authentication or security controls.

31
New cards

Rootkit

Software that hides malicious activity by manipulating the operating system to conceal files, processes, or connections.

32
New cards

Kernel-mode rootkits

Rootkits that operate at the OS kernel level, making them difficult to detect or remove.

33
New cards

Stealthing malware

To remain undetected while maintaining unauthorized control or data access.

34
New cards

Four main elements of malware prevention

Policy, awareness, vulnerability mitigation, and threat mitigation.

35
New cards

Main steps if malware prevention fails

Detection, identification, and removal.

36
New cards

First generation of antivirus software

Simple scanners relying on known malware signatures.

37
New cards

Heuristic scanners

They use behavioral rules and integrity checks to identify unknown malware variants.

38
New cards

Activity traps

They monitor behavior in real time rather than relying on static malware signatures.

39
New cards

Sandbox analysis

Running suspicious code in an isolated environment to observe and analyze its behavior safely.

40
New cards

Host-based behavior blocking

Software that monitors and blocks potentially malicious actions on a local machine before they cause harm.

41
New cards

Perimeter scanning approaches

By scanning email and web traffic at firewalls or intrusion detection systems to block suspicious content before it reaches users.