1.2 Flashcards
(24 cards)
The main difference between a virus and a worm.
A virus needs human interaction to duplicate, whereas a worm does not.
How does a worm duplicate itself?
Through the computer’s file systems or the network
A virus that never installs itself nor saves itself onto the file sytem
Fileless virus
Where does a fileless virus operate?
Within the computers memory
What 2 things help mitigate worm infestations?W
Firewalls and IDS/IPS
When an attacker captures a victim’s data and forces the victim to pay money to receive it back.W
Ransomware
When an attacker captures and encrypts your data
Cryptomalware
The most obvious way to protect against malware
Have an offline backup
Software/Malware that pretends to be something else
Trojan Horse
Software that is installed through malware that may slow down computer performance or plainly be annoying
PUP (Potentially Unwanted Program)
A way for malware to easily reconnect to an infected system once initially installed
Backdoor
Known as the ultimate backdoor, this gives a third party administrative control over a device
RAT (Remote Administration Tool)
This malware modifies the core system files - it can become invisible
Rootkit
This booting sequence checks to see if any part of the kernel has been changed, and if so, it will not boot that part.
Secure boot with UEFI BIOS
Malware that spies on a user’s interaction with their computer
Spyware
Your system becomes this once the attacker gains control of your system through malware.
Bot
Controls the bots of a botnet
Command and Control (server)
Type of attack that occurs when a separate event is triggered.
Logic bomb
The using of common passwords in hopes to infiltrate a user’s account, but not enough times to lock the account.
Spraying attack
Using every combination of letters, numbers, and special characters until the password is cracked.
Online Brute Force
Known as the process of obtaining the list of users and hashes, calculating a password has and comparing it to a stored hash.
Offline Brute Force
Cracking a password using common words related to a language or line of work.
Dictionary
Known as an optimized, pre-built set of hashes that contains pre-calculated hash chains
Rainbow tables
Passwords that are stored in unencrypted location
Plaintext