Section 6 Malware

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/25

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

26 Terms

1
New cards

Malware

any software that is used to do harm

2
New cards

Attack Vector

Method used by an attacker to gain access to a victim's machine in order to infect it with malware

3
New cards

virus

malicious software that attaches to clean files and spreads into a computer system

4
New cards

Ransomware

Software that encrypts programs and data until a ransom is paid to remove it.

5
New cards

Rootkits

Malicious tools that hide their activities and operate at the OS level to allow for ongoing privileged access

6
New cards

Backdoors

Malicious means of bypassing normal authentication processes to gain unauthorized access to a system

7
New cards

logic bombs

an instruction in a computer program that triggers a malicious act

8
New cards

Bloatware

Unnecessary or preinstalled software that consumes system resources in space, without offering any value to the user

9
New cards

name the different viruses

boot sector

macro virus

program virus

multipartite virus

encrypted virus

polymorphic virus

metamorphic virus

stealth virus

armored virus

hoax

10
New cards

Boot Sector Virus

Stored in the first sector of a hard drive, and instead loaded in the memory whenever the computer boots up

- difficult to detect

11
New cards

macro virus

A form of virus that infects the data files of commonly used applications such as word processors and spreadsheets.

12
New cards

program virus

Tries to find executable's or application files to infect with their malicious code

13
New cards

Multipartite Virus

Combination of a boot sector type virus and a program virus

14
New cards

Encrypted Virus

Designed to hide itself from being detected by encrypting its malicious code or payloads to avoid detection by any antivirus software

15
New cards

polymorphic virus

Advanced version of an encrypted virus that changes itself every time it is executed by altering the decryption module to avoid detection

16
New cards

Metamorphic Virus

Able to rewrite itself entirely before it attempts to infect a given file

- more advanced version of polymorphic

17
New cards

Stealth Virus

Not necessarily a specific type of virus as much as it is a technique used to prevent the virus from being detected by antivirus software

18
New cards

Armored Virus

Have a layer of protection to confuse a program or a person who's trying to analyze it

19
New cards

hoax

A form of technical social engineering that attempts to scare end-users into taking undesirable action on their system

20
New cards

Worms

standalone malware computer program that replicates itself in order to spread to other computers

-can infect the workstation and other computing assets

- can cause ddos

- spreading far and wide over the internet

21
New cards

which was the largest worm?

conficker

22
New cards

Trojan

A piece of malicious software that is disguised as a piece of harmless or desirable software

23
New cards

how to prevent ransomware?

-conducting regular backups

-installing regular software updates

-providing security awareness training

-implementing multi-factor authentication for the systems

24
New cards

Botnet

a network of powerful and dangerous hijacked computers that are used to attack systems or spread malware

25
New cards

Zombies

Computers that have been taken control by hackers

26
New cards

DLL injection

Technique used to run arbitrary code within the address space of another process by forcing it to load a dynamic link library