1/21
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Malware
software designed to harm devices or networks
Virus
Causes damage to data slash software
What are the five types of malicious Software
-virus
-worm
-Trojan
-Ransomware
-Spyware
Worm
Duplicates/spreads itself across systems
Trojan
Malware looks like a legitimate file
Ransomware
Encrypts data and demands payment to unlock it.
Spyware
Used to gather then sell info without consent.
Virus and worm. Which one needs to be activated and which one doesn't need to be activated?
Virus needs to be activated to start the infection. A worm does not need to be activated to start an infection.
Potentially unwanted application (PVA)
Unwanted software bundled in with legitimate programs which might display ads / device slow down.
When do attackers use potentially unwanted applications.
They use this type of malware in freeware, with insecure design to monetize ads for themselves instead ofThey use this type of malware in freeware with insecure design to monetize ads for themselves instead of developer.
Fileless malware
Resides in memory instead of a file. It never touches a hard drive.
Rootkit
Provides remote administrative access to a computer. Has two components a dropper and a loader.
When is a rootkit mostly used?
Used to open a back door to systems, allowing them to install other forms of malware.
Dropper
Malware that comes packed with malicious code, which is delivered and installed into a target systemMalware that comes packed with malicious code, which is delivered and installed into a target system.
How does a dropper work?
It disguises as a legitimate file to deceive its target into opening it.Which executes the malicious code.
Loader
Type of malware downloads strains of malicious code from an external source and installs them.Onto a target system. Botnet
Botnet
Collection of computers infected by malware under control of a single threat actor known as a botHerder
How does a botnet work
Uses viruses, worms and trojans to spread the infectionUses viruses, worms and trojans to spread the infection.
Crypto jacking
Form of malware that installs software to illegally mine cryptocurrencies
Intrusion detection system (IDS)
Application that monitors system actively and alerts on possible intrusions.
What is a way of identifying crypto jacking
By using IDS
Signs of crypto jacking infection
Slow down, c p u usage, sudden system crashes, fast draining batteries, electricity costs