1C Flashcards
(47 cards)
___ ___ is software or scripts written to intentionally cause undesired effects such as security breaches or damage to a system.
Malicious Code
Malicious code includes a broad category of related terms including…?
Attack Scripts
Viruses
Worms
Trojan Horses
Backdoors
____ is software designed to infiltrate or damage a computer system without the owner’s informed consent.
Malware
Many computer users are unfamiliar with the term, and often use the term, “___ ___” for all types of malware, including viruses.
computer virus
____ is considered malware because of the perceived intent of the creator rather than any features of the ____ itself. Malicious ____ and infectious programs created with malicious intent have been
present from the time ____ came into existence.
Software
Malware is not the same as ____ ____. ____ ____ is software which has a legitimate purpose but incidentally contains harmful
program bugs.
Defective software
The most common pathways that malware takes from criminals to users (known as attack vectors) are through ___ and ___.
email and World Wide Web
___ ___ are bits of computer programming, or code, that hide in computer programs or on the boot sector of storage devices
Computer viruses
The primary purpose of a ____ is to reproduce itself as often as possible and thereby disrupt the operation of the infected
computer or program. Once activated, a ___ can range from being simply annoying to catastrophic.
virus
Viruses are written by people with intent to do ___ and can be classified into many categories, based on how they propagate themselves and the nature of their behavior.
harm
What are the four types of viruses?
- Boot Sector Virus
- File Infector Virus
- Macro Virus
- Logic Bomb
The first type, called a “boot-sector virus,” resides in the first sector of a…?
disk or USB drive
The following describes which type of virus?
The virus executes when the computer is booted. It controls the boot sequence and determines which partition the computer boots from. A ___ ___virus is extremely dangerous. Once the boot code on the drive is infected, the virus will be loaded into memory on every startup. From memory, the boot virus can spread to every disk that the system reads. A common method of transmitting viruses from one computer to another is through the distribution of removable media like compact disc (CD) or USB drive. Each time the infected media gets used on a new device; the virus replicates itself onto the new drive. Any disk can cause infection if it is in the drive when the computer boots up. The virus can also be spread across networks
from file downloads and e-mail file attachments.
Boot Sector Virus
The following describes which type of virus?
The second type of virus is the “____ ____,” also known as an executable virus or parasitic virus. ____ ____ operate in memory and infect executable files. Such a virus attaches itself to a file or program and activates any time the file is used. When the program loads, the virus is loaded as well. Other ____ ____ viruses arrive as wholly contained programs or scripts sent as an attachment to an e-mail. Various subcategories of file infectors exist.
File Infector Virus
The following describes which type of virus?
Most applications today support ____, which are used to automate a task within the software application. A ____ virus is code written using a ____ language which performs a malicious action, such as deleting files or e-mailing everyone in your address book. The ____ is usually created within a file and triggered automatically when someone opens the file. ____ viruses infect files, not entire host computers or networks.
Macro Virus
The following describes which type of virus?
A ___ ___ is a type of virus planted on the system by installing a piece of software that contains some code that will not execute until a certain event occurs, such as a specific date.
Logic Bomb
One infected computer in an organization could easily infect all the computers in the organization by a single user passing around a
copy of the latest program. ___ ___ are often the primary means for convenient file transfers.
Flash drives
One of the most common methods of spreading a virus is through ___.
A ___ ___ is a program that a user is tricked into installing. The software that the user intended to download works exactly as expected. But there is additional software embedded inside the legitimate code that the user does not know about and would not give permission to install if they knew. ___ ___ allow unauthorized access to an infected host by opening a back door on the infected machine which allows a hacker to connect to the system remotely and take control of it.
Trojan horse
A ___ is like a virus except that ___ require no user intervention to self-replicate. ___ can infect a network in several ways, such as by using certain vulnerable network ports/protocols, by opening infected e-mail messages, and by inserting infective flash drives into the host computer.
worm
The effect of viruses may cause data loss, but some viruses are designed specifically to delete files or issue a physically harmful
series of instructions to hard drives. Such viruses are termed ____.
destructive
What are common symptoms of computer virus infection?
- The computer will not boot.
- The data is scrambled or corrupted.
- The computer operates erratically.
- A partition is lost.
- The hard drive is reformatted.
- Programs suddenly open and close without your input.
- Warnings and error messages are displayed at unusual times.
The most common symptom of an infection on a network is one or more workstations with ___ ___.
erratic errors
What are some other types of malware that you should be aware of?
- Ransomware
- Spyware
- Adware
- Rootkit