Malware

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/21

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

22 Terms

1
New cards

Malware

software designed to harm devices or networks

2
New cards

Virus

Causes damage to data slash software

3
New cards

What are the five types of malicious Software

-virus

-worm

-Trojan

-Ransomware

-Spyware

4
New cards

Worm

Duplicates/spreads itself across systems

5
New cards

Trojan

Malware looks like a legitimate file

6
New cards

Ransomware

Encrypts data and demands payment to unlock it.

7
New cards

Spyware

Used to gather then sell info without consent.

8
New cards

Virus and worm. Which one needs to be activated and which one doesn't need to be activated?

Virus needs to be activated to start the infection. A worm does not need to be activated to start an infection.

9
New cards

Potentially unwanted application (PVA)

Unwanted software bundled in with legitimate programs which might display ads / device slow down.

10
New cards

When do attackers use potentially unwanted applications.

They use this type of malware in freeware, with insecure design to monetize ads for themselves instead ofThey use this type of malware in freeware with insecure design to monetize ads for themselves instead of developer.

11
New cards

Fileless malware

Resides in memory instead of a file. It never touches a hard drive.

12
New cards

Rootkit

Provides remote administrative access to a computer. Has two components a dropper and a loader.

13
New cards

When is a rootkit mostly used?

Used to open a back door to systems, allowing them to install other forms of malware.

14
New cards

Dropper

Malware that comes packed with malicious code, which is delivered and installed into a target systemMalware that comes packed with malicious code, which is delivered and installed into a target system.

15
New cards

How does a dropper work?

It disguises as a legitimate file to deceive its target into opening it.Which executes the malicious code.

16
New cards

Loader

Type of malware downloads strains of malicious code from an external source and installs them.Onto a target system. Botnet

17
New cards

Botnet

Collection of computers infected by malware under control of a single threat actor known as a botHerder

18
New cards

How does a botnet work

Uses viruses, worms and trojans to spread the infectionUses viruses, worms and trojans to spread the infection.

19
New cards

Crypto jacking

Form of malware that installs software to illegally mine cryptocurrencies

20
New cards

Intrusion detection system (IDS)

Application that monitors system actively and alerts on possible intrusions.

21
New cards

What is a way of identifying crypto jacking

By using IDS

22
New cards

Signs of crypto jacking infection

Slow down, c p u usage, sudden system crashes, fast draining batteries, electricity costs