Chapter 5 – Malware & Cyber-Attacks

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/12

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

13 Terms

1
New cards

Q: What is malware?

Malware (malicious software) refers to programs designed to disrupt, damage, or gain unauthorized access to systems. Types include viruses, worms, Trojans, ransomware, spyware, and rootkits.

2
New cards

Q: What distinguishes viruses, worms, and Trojans?

Viruses attach to host files and require user activation; Worms self-replicate and spread across networks; Trojans disguise themselves as legitimate software but deliver malicious payloads.

3
New cards

Q: What is ransomware?

Ransomware encrypts victim data and demands payment (often cryptocurrency) for its release. It has become a major cybercrime threat targeting individuals, companies, and critical infrastructure.

4
New cards

Q: How does phishing relate to malware?

Phishing emails trick users into downloading attachments or clicking links that deliver malware. This social engineering vector makes human error a key vulnerability.

5
New cards

Q: What are botnets?

Botnets are networks of compromised computers controlled remotely by attackers. They can be used for spam, DDoS attacks, credential theft, and click fraud.

6
New cards

Q: What is a Distributed Denial of Service (DDoS) attack?

A DDoS attack overwhelms a target server or network with traffic from multiple compromised systems, making it unavailable to legitimate users.

7
New cards

Q: What is spyware and adware?

Spyware secretly monitors user activity and collects data. Adware automatically delivers advertisements, sometimes maliciously. Both may compromise privacy and security.

8
New cards

Q: How does Routine Activities Theory explain malware victimization?

Malware exploits occur when motivated offenders (hackers, cybercriminals) find suitable targets (unprotected users) without capable guardians (antivirus, patches, awareness).

9
New cards

Q: What role does social engineering play in malware distribution?

Attackers manipulate victims into bypassing security—e.g., clicking links, opening attachments, or disabling protections—making human error central to infection.

10
New cards

Q: How do zero-day exploits work?

Zero-day exploits target previously unknown vulnerabilities before developers release patches. They are highly valuable and often traded in underground markets.

11
New cards

Q: What are challenges in defending against malware?

Challenges include rapid evolution of threats, encrypted communication, polymorphic malware (which changes its code), and resource limitations for law enforcement and organizations.

12
New cards

Q: What are international responses to malware threats?

Responses include CERTs (Computer Emergency Response Teams), public-private partnerships, and conventions like the Council of Europe’s Budapest Convention on Cybercrime.

13
New cards