Malware And Social Threats Flashcards
(44 cards)
What is malware?
Malware is software designed to disrupt, damage, or gain unauthorized access to computer systems.
Malware encompasses various types of malicious software, including viruses, worms, and spyware.
Define Trojan.
A Trojan is a type of malware that disguises itself as legitimate software to trick users into installing it.
Trojans can create backdoors for attackers to exploit a system.
What is a rootkit?
A rootkit is a collection of tools that allows unauthorized users to gain control of a computer system without being detected via the firmware
Seek to gain higher level privileges
What is a virus?
A virus is a type of malware that attaches itself to a legitimate program and spreads to other programs and files.
Viruses can corrupt or delete data, and they often require user action to spread.
Define spyware.
Spyware is a type of malware that secretly monitors user activity and collects personal information.
Spyware is often paired with a key logger
What is ransomware?
Ransomware is malware that encrypts the victim’s files and demands payment for the decryption key.
Ransomware can cause significant data loss and financial damage.
What is a keylogger?
A keylogger is a type of spyware that records keystrokes to capture sensitive information such as passwords.
Keyloggers can be used for identity theft and other malicious activities.
What is a boot sector virus?
A boot sector virus infects the master boot record of a hard drive, allowing it to execute before the operating system loads.
These viruses can be particularly damaging as they can prevent the system from booting.
What are cryptominers?
Cryptominers are programs that use system resources to mine cryptocurrencies without the user’s consent.
Using mass botnets,Cryptominers can significantly slow down system performance.
List some tools and methods for detecting and preventing malware.
- Antivirus
- Anti-malware
- Software firewalls
- Recovery mode
- Anti-phishing training
- User education regarding common threats
- OS reinstallation
These tools and methods help enhance system security and reduce the risk of malware infections.
What is the purpose of recovery mode?
Recovery mode is used to troubleshoot and repair a malfunctioning operating system or to restore it to a previous state.
Recovery mode can be essential for removing persistent malware.
True or False: User education plays a role in preventing malware infections.
True
Educating users about common threats and safe practices can significantly reduce the risk of malware infiltration.
Fill in the blank: _______ is a type of malware that encrypts files and demands payment for the decryption key.
Ransomware
What is social engineering?
A manipulation technique that exploits human psychology to gain confidential information or access.
What are the main types of phishing?
Phishing and vishing.
What is shoulder surfing?
The act of observing someone’s screen or keyboard to obtain sensitive information.
What is whaling in the context of social engineering?
A type of phishing that targets high-profile individuals or executives.
What is tailgating?
An unauthorized person following an authorized individual into a secure area.
What is impersonation in social engineering?
Pretending to be someone else to gain access to information or systems.
What is dumpster diving?
Searching through trash to find sensitive information.
What is an evil twin attack?
A fraudulent Wi-Fi network that mimics a legitimate one to steal information.
What is a distributed denial of service (DDoS) attack?
An attack that overwhelms a target with traffic from multiple sources.
What is a denial of service (DoS) attack?
An attack that aims to make a service unavailable by overwhelming it with requests.