46. Malware

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/18

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

19 Terms

1
New cards

Malware

Any software that is designed to infiltrate a computer system without the user’s knowledge

2
New cards

Malware needs

A threat vector and an attack vector

3
New cards

Threat Vector

Specific method used by an attacker to infiltrate a victim’s machine

4
New cards

Threat Vector Examples

Unpatched software

Installing code

Phishing campaign

Other vulnerabilities

5
New cards

Attack Vector

A means by which an attacker gains access to a computer to infect the system with malware; Essentially how a vulnerability is actually exploited

6
New cards
Viruses
Malicious software that attaches to clean files and spreads into a computer system
7
New cards
Worms
Standalone malware programs that replicate and spread to other systems by exploiting software vulnerabilities
8
New cards
Trojans
Malicious programs which appear to be legitimate software that allows unauthorized access to a victim's system when executed
9
New cards
Ransomware
Encrypts a user's data and holds it hostage until a ransom is paid to the attacker for decryption
10
New cards
Zombies
Compromised computers that are remotely controlled by attackers and used in coordination to form a botnet
11
New cards
Botnets
Network of zombies and are often used for DDoS attacks, spam distribution, or cryptocurrency mining
12
New cards
Rootkits
Malicious tools that hide their activities and operate at the OS level to allow for ongoing privileged access
13
New cards
Backdoors
Malicious means of bypassing normal authentication processes to gain unauthorized access to a system
14
New cards
Logic Bombs
Embed code placed in legitimate programs that executes a malicious action when a specific condition or trigger occurs
15
New cards
Keylogger
Record a user's keystrokes and are used to capture passwords or other sensitive information
16
New cards
Spyware
Secretly monitors and gathers user information or activities and sends data to third parties
17
New cards
Bloatware
Unnecessary or pre-installed software that consumes system resources and space without offering any value to the user
18
New cards
Malware Attack Techniques
Involve methods by which malware infiltrates and infects targeted systems
19
New cards

Indications of Malware Attacks

Account Lockouts

Concurrent session utilization

Blocked content

Impossible travel

Resource consumption

Resource inaccessibility

Out-of-cycle logging

Missing logs

Published or documented attacks