CompTIA Security+ Study Guide Chapter 3: Malicious Code

studied byStudied by 2 people
0.0(0)
Get a hint
Hint

Malware

1 / 15

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

16 Terms

1

Malware

A wide range of software that is intentionally designed to cause harm to systems and devices, networks, or users. It can also gather information, provide illicit access, and take a broad range of actions that the legitimate owner of a system or network may not want to occur.

New cards
2

Ransomware

Malware that takes over a computer and then demands a ransom. ex. Crypto Malware

New cards
3

Trojans

Type of malware that is typically disguised as legitimate software.

New cards
4

Worms

Malware that can spread by itself through email attachments, network file shares, or other methods as well.

New cards
5

Rootkits

Malware that is specifically designed to allow attackers to access a system through a backdoor.

New cards
6

Backdoors

Methods or tools that provide access that bypass normal authentication and authorization procedures, allowing attackers access to systems, devices, or applications.

New cards
7

Bots

Remotely controlled systems or devices that have a malware infection.

New cards
8

Botnets

Group of bots.

New cards
9

Command and Control (C&C)

Core of a botnet. They allow attackers to manage the botnet and have a broad range of capabilities that can help attackers steal data, conduct DDOS attacks on a massive scale, deploy and update additional malware capabilities, and respond to attempts by defenders to protect their network.

New cards
10

Keyloggers

Programs that capture keystrokes from keyboards, although keylogger applications may also capture other input like mouse movement, touchscreen inputs, or credit card swipes from attached devices.

New cards
11

Logic Bombs

Functions or code that are placed inside other programs that will activate when set conditions are met. ex. Specific date or Set of Conditions

New cards
12

Viruses

Malicious programs that self-copy and self-replicate. Requires one ore more infection mechanisms that they use to spread themselves, typically paired with some form os search capability to find new places to spread to. Also typically have both a trigger, and a payload.

New cards
13

Fileless Virus

Similar to traditional viruses in a number of critical ways. Spread through spam email and malicious websites. Exploits flaws in browser plug-ins and web browsers themselves. They inject themselves into memory and do not require local file storage.

New cards
14

Spyware

Malware that is designed to obtain information about an individual, organization, or system. Many track users browsing habits, installed software, or similar information and report it back to central servers. Can also tap into web cameras.

New cards
15

Potentially Unwanted Programs (PUPs)

Programs that may not be wanted by the user but are not as dangerous as other types of malware. Typically installed without the user's awareness or as part of a software bundle.

New cards
16

Adversarial Artificial Intelligence

A developing field where artificial intelligence (AI) is used by attackers for malicious purposes. The focus of these attacks currently tends to deal with data poisoning, providing security and analytic AI and ML algorithms with adversarial input that serves the attackers purposes.

New cards

Explore top notes

note Note
studied byStudied by 10 people
... ago
5.0(1)
note Note
studied byStudied by 12 people
... ago
4.0(1)
note Note
studied byStudied by 5 people
... ago
4.0(1)
note Note
studied byStudied by 18 people
... ago
5.0(1)
note Note
studied byStudied by 13 people
... ago
5.0(1)
note Note
studied byStudied by 10 people
... ago
4.0(1)
note Note
studied byStudied by 23 people
... ago
5.0(1)
note Note
studied byStudied by 40070 people
... ago
4.8(312)

Explore top flashcards

flashcards Flashcard (201)
studied byStudied by 32 people
... ago
5.0(1)
flashcards Flashcard (64)
studied byStudied by 8 people
... ago
5.0(1)
flashcards Flashcard (22)
studied byStudied by 6 people
... ago
4.0(2)
flashcards Flashcard (42)
studied byStudied by 2 people
... ago
5.0(1)
flashcards Flashcard (91)
studied byStudied by 4 people
... ago
5.0(1)
flashcards Flashcard (35)
studied byStudied by 19 people
... ago
5.0(1)
flashcards Flashcard (32)
studied byStudied by 18 people
... ago
4.0(1)
flashcards Flashcard (45)
studied byStudied by 4 people
... ago
5.0(1)
robot