Chapter 3: Malicious Code

studied byStudied by 0 people
0.0(0)
Get a hint
Hint

Malware (Malicious Software)

1 / 25

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

26 Terms

1

Malware (Malicious Software)

Any software that brings harm to a computer system.

New cards
2

Ransomware

Software that encrypts programs and data until a ransom is paid to remove it.

New cards
3

Trojans

Programs that look useful, but actually cause damage to your computer

New cards
4

Remote Access Trojan (RAT)

Provides the attacker with remote control of a victim computer and is the most commonly used type of Trojan

New cards
5

Anti-malware software

Software designed to stop malware from damaging a computer or network

New cards
6

Worms

destructive programs that replicate themselves without requiring another program to provide a safe environment for replication

New cards
7

Rootkits

Programs that allow hackers to gain access to your computer and take almost complete control of it without your knowledge. These programs are designed to subvert normal login procedures to a computer and to hide their operations from normal detection methods.

New cards
8

Backdoors

Used in computer programs to bypass normal authentication and other security mechanisms in place.

New cards
9

Bots

Software robots that function automatically. A botnet is a group of computers that are joined together. Attackers often use malware to join computers to a botnet, and then use the botnet to launch attacks.

New cards
10

command and control servers

Used by hackers to control malware that has been launched against targets.

New cards
11

Fast-flux DNS

A technique rapidly changes the IP address associated with a domain

New cards
12

DNS (Domain Name System)

The Internet's system for converting alphabetic names into numeric IP addresses.

New cards
13

Security Information and Event Management (SIEM)

A method for analyzing risk in software systems. It is a centralized collection of monitoring of security and event logs from different systems. SIEM allows for the correlation of different events and early detection of attacks.

New cards
14

keylogger

a malicious program that records keystrokes.

New cards
15

multifactor authentication

the use of two or more types of authentication credentials in conjunction to achieve a greater level of security

New cards
16

logic bombs

an instruction in a computer program that triggers a malicious act

New cards
17

computer viruses

A program that copies itself into other programs, files or drives.

New cards
18

memory-resident viruses

A virus that is capable of installing itself in a computer's operating system, starting when the computer is activated, and residing in the system's memory even after the host application is terminated. Also known as a resident virus.

New cards
19

non-memory-resident virus

A virus that terminates after it has been activated, infected its host system, and replicated itself.

New cards
20

boot sector virus

Which type of malware hides in the MBR program of a hard drive?

New cards
21

Macro viruses

A type of virus that uses a program's own macro programming language to distribute the virus

New cards
22

email virus

a virus transmitted by email that often uses the address book in the victims email system to distribute itself

New cards
23

Fileless virus

sSoftware that uses legitimate programs to infect a computer. It does not rely on files and leaves no footprint, making it challenging to detect and remove.

New cards
24

Spyware

a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission

New cards
25

potentially unwanted program (PUP)

program that installs itself on a computer, typically without the user's informed consent

New cards
26

Adversial artificial intelligence (AI)

artificial intelligence is used by the attackers for malicious purposes

New cards

Explore top notes

note Note
studied byStudied by 7 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 14 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 8 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 66 people
Updated ... ago
5.0 Stars(3)
note Note
studied byStudied by 17 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 34 people
Updated ... ago
4.0 Stars(1)
note Note
studied byStudied by 634 people
Updated ... ago
5.0 Stars(3)

Explore top flashcards

flashcards Flashcard86 terms
studied byStudied by 1 person
Updated ... ago
5.0 Stars(1)
flashcards Flashcard29 terms
studied byStudied by 1 person
Updated ... ago
5.0 Stars(1)
flashcards Flashcard109 terms
studied byStudied by 33 people
Updated ... ago
4.0 Stars(1)
flashcards Flashcard30 terms
studied byStudied by 7 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard51 terms
studied byStudied by 21 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard46 terms
studied byStudied by 4 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard73 terms
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard30 terms
studied byStudied by 14 people
Updated ... ago
5.0 Stars(1)