Chapter 3: Malicious Code

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
GameKnowt Play
New
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/25

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

26 Terms

1
New cards

Malware (Malicious Software)

Any software that brings harm to a computer system.

2
New cards

Ransomware

Software that encrypts programs and data until a ransom is paid to remove it.

3
New cards

Trojans

Programs that look useful, but actually cause damage to your computer

4
New cards

Remote Access Trojan (RAT)

Provides the attacker with remote control of a victim computer and is the most commonly used type of Trojan

5
New cards

Anti-malware software

Software designed to stop malware from damaging a computer or network

6
New cards

Worms

destructive programs that replicate themselves without requiring another program to provide a safe environment for replication

7
New cards

Rootkits

Programs that allow hackers to gain access to your computer and take almost complete control of it without your knowledge. These programs are designed to subvert normal login procedures to a computer and to hide their operations from normal detection methods.

8
New cards

Backdoors

Used in computer programs to bypass normal authentication and other security mechanisms in place.

9
New cards

Bots

Software robots that function automatically. A botnet is a group of computers that are joined together. Attackers often use malware to join computers to a botnet, and then use the botnet to launch attacks.

10
New cards

command and control servers

Used by hackers to control malware that has been launched against targets.

11
New cards

Fast-flux DNS

A technique rapidly changes the IP address associated with a domain

12
New cards

DNS (Domain Name System)

The Internet's system for converting alphabetic names into numeric IP addresses.

13
New cards

Security Information and Event Management (SIEM)

A method for analyzing risk in software systems. It is a centralized collection of monitoring of security and event logs from different systems. SIEM allows for the correlation of different events and early detection of attacks.

14
New cards

keylogger

a malicious program that records keystrokes.

15
New cards

multifactor authentication

the use of two or more types of authentication credentials in conjunction to achieve a greater level of security

16
New cards

logic bombs

an instruction in a computer program that triggers a malicious act

17
New cards

computer viruses

A program that copies itself into other programs, files or drives.

18
New cards

memory-resident viruses

A virus that is capable of installing itself in a computer's operating system, starting when the computer is activated, and residing in the system's memory even after the host application is terminated. Also known as a resident virus.

19
New cards

non-memory-resident virus

A virus that terminates after it has been activated, infected its host system, and replicated itself.

20
New cards

boot sector virus

Which type of malware hides in the MBR program of a hard drive?

21
New cards

Macro viruses

A type of virus that uses a program's own macro programming language to distribute the virus

22
New cards

email virus

a virus transmitted by email that often uses the address book in the victims email system to distribute itself

23
New cards

Fileless virus

sSoftware that uses legitimate programs to infect a computer. It does not rely on files and leaves no footprint, making it challenging to detect and remove.

24
New cards

Spyware

a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission

25
New cards

potentially unwanted program (PUP)

program that installs itself on a computer, typically without the user's informed consent

26
New cards

Adversial artificial intelligence (AI)

artificial intelligence is used by the attackers for malicious purposes