Lecture 3a Flashcards
(39 cards)
What is malware?
Software that enters a computer system without the user’s knowledge or consent and performs unwanted harmful actions
What are the five primary actions malware performs?
Imprison Launch Snoop Deceive Evade
What does ransomware do?
Prevents a user’s endpoint device from functioning properly until a fee is paid
What is crypto-malware?
Malware that imprisons users by encrypting all files on the device making them inaccessible
How does crypto-malware increase the cost of unlocking?
The cost of the key increases every few hours or days
What are the two main types of viruses?
File-based virus and fileless virus
What is a file-based virus?
Malicious code attached to a file that reproduces itself on the same computer without human intervention
What is an armoured file-based virus?
A virus that uses techniques like split infection and mutation to avoid detection
What is a fileless virus?
Virus that does not attach to files but loads code into computer memory to avoid detection
List advantages of fileless viruses over file-based viruses.
Easy to infect Extensive control Persistent Difficult to detect Difficult to defend against
What is a worm?
A malicious program that uses a computer network to replicate exploiting vulnerabilities in applications or OS
What harmful actions can worms perform?
Deleting files Allowing remote control by attackers
What is a bot in malware terms?
An infected computer under remote control used to launch attacks
What is a botnet?
A network of infected bot computers controlled by a bot herder
What are two common types of snooping malware?
Spyware and keyloggers
What does spyware do?
Tracking software deployed without user’s consent or control
What is a keylogger?
Software or hardware that silently captures and stores each keystroke typed on a keyboard
What is a Potentially Unwanted Program (PUP)?
Software the user does not want that may include intrusive advertising or hijacking browser settings
What is a Trojan?
An executable program that appears benign but performs malicious actions
What is a Remote Access Trojan (RAT)?
A Trojan that gives unauthorized remote access to the victim’s computer using special communication protocols
What is a backdoor in malware?
Malware that gives access circumventing normal security protections
What is a logic bomb?
Malware code that lies dormant and activates when a specific logical event triggers it
What is a rootkit?
Malware that hides its presence and other malware by accessing lower layers of the operating system