WITH VERIFIED CORRECT
SOLUTIONS || LATEST UPDATE
Malware - ANSWER ✔ software designed to infiltrate a computer
system and possibly damage it without the user's knowledge or
consent
Virus - ANSWER ✔ code that runs on a computer without the
user's knowledge; it infects the computer when the code is
accessed and executed (love bug virus)
Worm - ANSWER ✔ like a virus except that it self-replicates,
whereas a virus does not (nimda, propagated through network
shares and mass e-mailing)
Trojan Horse - ANSWER ✔ appear to perform desirable
functions but are actually performing malicious functions behind
the scenes (remote access trojan, plugx)
Remote Access Trojan (RAT) - ANSWER ✔ their capability to
allow an attacker higher administration privileges than those of
the owner of the system makes them quite dangerous; most
common type of Trojan
Ransomware - ANSWER ✔ a type of malware that restricts
access to a computer system and demands that a ransom be
,paid; also known as crypto-malware, it encrypts files and/or locks
the system (often propagated via a trojan, cryptolocker)
Spyware - ANSWER ✔ malicious software either downloaded
unwittingly from a website or installed along with some other third-
party software; usually collects information without the user's
consent (internet optimizer - dyfuca)
Adware - ANSWER ✔ usually falls into the realm of spyware
because it pops up advertisements based on what it has learned
from spying on the user
Grayware - ANSWER ✔ describes applications that are behaving
improperly but without serious consequences
Rootkit - ANSWER ✔ a type of software designed to gain
administrator-level control over a computer system without being
detected (boot loader rootkits, evil maid attack, alureon)
Spam - ANSWER ✔ the abuse of electronic messaging systems
such as e-mail, texting, social media, broadcast media, instant
messaging, and so on (identity theft e-mails [phishing], lottery
scam e-mails)
Threat Vector - ANSWER ✔ the method that a threat uses to
access a target is known
Attack Vector - ANSWER ✔ the means by which an attacker
gains access to a computer in order to deliver malicious software;
most common is via software
Typosquatting - ANSWER ✔ when a user is attempting to access
a website but types the incorrect domain name by mistake and
,the user is redirected to an altogether unwanted website that's
malicious in nature
Botnet - ANSWER ✔ malware distributed throughout the internet
by a group of compromised computers
Zombie - ANSWER ✔ the individual compromised computers in
the botnet
Active Interception - ANSWER ✔ normally includes a computer
placed between the sender and the receiver to capture and
possibly modify information
Privilege Escalation - ANSWER ✔ the act of exploiting a bug or
design flaw in a software or firmware application to gain access to
resources that normally would've been protected from an
application or user
Backdoors - ANSWER ✔ used in computer programs to bypass
normal authentication and other security mechanisms in place
Logic Bomb - ANSWER ✔ code that has been inserted into
software; it is meant to initiate one of many types of malicious
functions when specific criteria are met
Time Bomb - ANSWER ✔ trojans set off on a certain date
Open Mail Relay - ANSWER ✔ enables anyone on the internet to
send e-mail through the SMTP server; should either be closed or
configured in such a way that only customers and properly
authenticated users can use them
Types of Viruses - ANSWER ✔ -boot sector
, -macro
-program
-encrypted
-polymorphic
-metamorphic
-stealth
-armored
-multipartite
Boot Sector - ANSWER ✔ initially loads into the first sector of the
hard drive; when the computer boots, the virus then loads into
memory
Macro - ANSWER ✔ usually placed in documents and e-mailed
to users in the hopes that the users will open the document, thus
executing the virus
Program - ANSWER ✔ infects executable files
Encrypted - ANSWER ✔ uses a simple cipher to encrypt itself;
the virus consists of an encrypted copy of the virus code (to help
avoid detection) and a small decryption module
Polymorphic - ANSWER ✔ builds on the concept of an encrypted
virus, but the decrypting module is modified with each infection; it
can change every time it is executed in an attempt to avoid
antivirus detection
Metamorphic - ANSWER ✔ similar to polymorphic but rewrites
itself completely each time it is going to infect a new file in a
further attempt to avoid detection
Stealth - ANSWER ✔ uses various techniques to go unnoticed by
antivirus programs