Malware Part 1
One key feature of malware
It can work jointly with other malware types
Metasploit
A penetration-testing tool that can be used to help protect a system or to break into one.
Trojan
A program disguised as a harmless application that actually produces harmful results.
Keylogger
A small hardware device or a program that monitors search keystroke a user types on the computer's keyboard.
IP address
A number that uniquely identifies each computer or device connected to the Internet.
Viruses and worms
Affect a system by slowing down the system
Backdoor
An unrecognized entry into a computer or system
ransomware attack
Files are encrypted and a ransom is demanded to regain access
Rootkits
Hard to discover and remove because they modify the core of an operating system
Malware
Software that is designed to intentionally cause harm to a device, server, or network
anti-virus software
The best way to counteract a computer virus
Firewall
The best way to help prevent a system from a worm attack
Keep a backup
The best way to protect yourself against ransomware
Email Attachments
The most common way that malware is delivered to a system
Malware Database
Tool used to examine malware and see their impact on a system.
Software keylogger
Type of keylogger that does not require a connection between a keyboard and a computer
Remote Access Trojan (RAT)
Type of malware gives attackers remote access to a device or system and usually goes undetected
Most common Malware vulnerability
Using old versions of software and OS
networks
Worms will infect other computers by moving through
a file, document, or program
A computer virus attaches to ______ in order to execute malicious code
Keystroke
A key used on a keyboard
Worm
Malware type can replicate itself without the help of a host system or human interaction
Virus
Malware type can self-replicate with the assistance of a host system
Cryptomalware
Ransomware that encrypts data and asks for cryptocurrency for the key
Root
Refers to the admin account on Linux