What is malware?
Malicious software designed to infiltrate computer systems and potentially damage them without user consent
Malware includes various types such as viruses, worms, and ransomware.
Name the categories of malware.
Each category has distinct characteristics and methods of operation.
What is the difference between Threat Vector and Attack Vector?
Attack vectors combine both the infiltration method and the infection process.
What are the types of malware attacks?
Each type has unique methods and impacts on systems.
What are some indications of a malware attack?
Recognizing these signs can help in early detection of malware.
What is a computer virus?
Made up of malicious code that’s run on a machine without the user’s knowledge
This allows the code to infect the computer whenever it has been run.
Name 10 different types of viruses.
Each type has specific characteristics and methods of infection.
What is a worm?
Piece of malicious software that can replicate itself without any user interaction
Worms can spread throughout a network without user consent.
What is a Trojan?
Malicious software disguised as harmless software
Trojans often claim to perform a needed function while granting unauthorized access.
What is ransomware?
Malicious software designed to block access to a computer system or its data by encrypting it until a ransom is paid
Regular backups and security awareness training can help protect against ransomware.
What is a botnet?
Network of compromised computers or devices controlled remotely by malicious actors
Botnets are often used for illegal activities, including DDoS attacks.
What is a rootkit?
Designed to gain administrative level control over a computer system without being detected
Rootkits can hide their presence and activities, making them difficult to detect.
What is a backdoor?
Originally placed in computer programs to bypass normal security and authentication functions
Backdoors can be used by threat actors to maintain persistent access to systems.
What is a keylogger?
Records every single keystroke made on a computer or mobile device
Keyloggers can be software-based or hardware-based.
What is spyware?
Malicious software designed to gather and send information about a user or organization without their knowledge
Spyware can be installed through various methods, including bundled software.
What is bloatware?
Software that comes pre-installed on a new computer or smartphone that the user did not specifically request
Bloatware can waste storage space and slow down device performance.
What is a malware exploitation technique?
Specific method by which malware code penetrates and infects a targeted system
Modern malware often uses fileless techniques to avoid detection.
What is a Stage 1 Dropper or Downloader?
Piece of malware created as a lightweight shellcode that can be executed on a given system
Its primary function is to retrieve additional portions of malware code.
What are the 9 common indicators of malware attacks?
Monitoring these indicators can help in identifying potential malware infections.