Malware Flashcards
(38 cards)
What is the weakest link principle?
The weakest link in a security chain is responsible for failure of security systems
What is malware (malicious software)?
Any software design to cause harm to computer systems, networks, or users
What can malware do if it infiltrates a system?
- Steal sensitive data
- Disrupt system operations
- Allow unauthorised access to device
What types of malware are there?
- Viruses
- Worms
- Trojans
- Ransonware
- Zombies
- Bonets
What is a virus?
A malicious executable code attached to another executable file
How can viruses be prevented?
Using antivirus and avoiding untrustworthy files
What are worms?
Self replicating malware that doesn’t require a host to run
How do worms spread?
Copy themselves and send themselves to several devices across the network
What allows worms to spread?
Network vulnerabilities, email attachments or malicious links
How do you prevent computer worms?
Regular updates and using a firewall
What are Trojans?
Malware disguised as legitimate software
How can Trojans be prevented?
Being cautious with emails and downloads
What is ransomware?
Infects computer, encrypts files and locks system for a ransom
How can ransomware be prevented?
backup files and avoid suspicious links
What is a zombie?
A computer that has been compromised and controlled by hackers
How are zombies spread?
Can be spread by any malware i.e. trojans, worms
How to prevent computer becoming a zombie?
Regular updates, monitor unusual activity, strong authentication firewalls
What is a botnet?
A network of zombies controlled remotely
What is the impact of zombies?
Can send spam emails, steal sensitive data or launch DDoS attacks
What is a DDoS attack?
A hacker makes a website or other services inaccessible by flooding it with requests from many different devices
How do malware gain access?
- phishing emails
- Exploiting weak systems
- Manipulating victims
- Fake websites or ads
- Hidden within software
What are the effects of malware?
- Data theft
- System damage
- Loss of privacy
- Financial loss
- performance issues
- Reputation damage to organisations
Other than malware, what other methods are used to gain personal information?
- Phishing
- Social engineering
- Grooming
- Deepfakes
- Online stalking
What is phishing?
Spam emails containing malicious hyperlinks that convince victims to give personal information