Podcast
Questions and Answers
A non-resident virus resides in the computer's memory.
A non-resident virus resides in the computer's memory.
False
Malicious Software is synonymous with the term Malware.
Malicious Software is synonymous with the term Malware.
True
A computer worm needs user intervention to spread to other nodes.
A computer worm needs user intervention to spread to other nodes.
False
Resident viruses can attack any file or application on a device.
Resident viruses can attack any file or application on a device.
Signup and view all the answers
Malicious malware software can be transmitted through viruses, worms, and trojans.
Malicious malware software can be transmitted through viruses, worms, and trojans.
Signup and view all the answers
Computer viruses are incapable of replicating themselves.
Computer viruses are incapable of replicating themselves.
Signup and view all the answers
Worms can modify existing files on the system.
Worms can modify existing files on the system.
Signup and view all the answers
Rootkits are a type of malicious software.
Rootkits are a type of malicious software.
Signup and view all the answers
The I LOVE YOU virus was written in Python.
The I LOVE YOU virus was written in Python.
Signup and view all the answers
The Morris Worm was launched in 1988.
The Morris Worm was launched in 1988.
Signup and view all the answers
The Storm Worm was an email worm launched in 2000.
The Storm Worm was an email worm launched in 2000.
Signup and view all the answers
Ransomware locks and encrypts a victim's data until a ransom is paid.
Ransomware locks and encrypts a victim's data until a ransom is paid.
Signup and view all the answers
SQL Slammer utilized traditional methods to distribute itself.
SQL Slammer utilized traditional methods to distribute itself.
Signup and view all the answers
Onel de Guzman was a young Filipino responsible for creating the I LOVE YOU virus.
Onel de Guzman was a young Filipino responsible for creating the I LOVE YOU virus.
Signup and view all the answers
Trojan horses can spread other viruses or install a backdoor.
Trojan horses can spread other viruses or install a backdoor.
Signup and view all the answers
Jerusalem was the first known computer worm discovered in 1990.
Jerusalem was the first known computer worm discovered in 1990.
Signup and view all the answers
Spyware programs install themselves on the user's computer without their awareness.
Spyware programs install themselves on the user's computer without their awareness.
Signup and view all the answers
A rootkit can only spread through physical connection to the computer.
A rootkit can only spread through physical connection to the computer.
Signup and view all the answers
Firmware rootkits can be easily detected by standard cybersecurity tools.
Firmware rootkits can be easily detected by standard cybersecurity tools.
Signup and view all the answers
Memory rootkits reside on a computer's RAM and can affect performance.
Memory rootkits reside on a computer's RAM and can affect performance.
Signup and view all the answers
Application rootkits are benign and do not modify regular files.
Application rootkits are benign and do not modify regular files.
Signup and view all the answers
Rootkits are referred to as the Swiss Army Knives of malware because of their multiple capabilities.
Rootkits are referred to as the Swiss Army Knives of malware because of their multiple capabilities.
Signup and view all the answers
System crashes are often a sign of rootkit infections affecting important system components.
System crashes are often a sign of rootkit infections affecting important system components.
Signup and view all the answers
Uninstalling unnecessary programs can help protect against spyware infections.
Uninstalling unnecessary programs can help protect against spyware infections.
Signup and view all the answers
A computer can be infected with Trojans by opening an email attachment.
A computer can be infected with Trojans by opening an email attachment.
Signup and view all the answers
Adware is considered a highly malicious type of software.
Adware is considered a highly malicious type of software.
Signup and view all the answers
Key loggers are a type of Trojan that logs keystrokes to steal personal information.
Key loggers are a type of Trojan that logs keystrokes to steal personal information.
Signup and view all the answers
The Trojan horse is always a text file with a .txt extension.
The Trojan horse is always a text file with a .txt extension.
Signup and view all the answers
Signs of mobile adware can include unexplained data usage and numerous ad pop-ups.
Signs of mobile adware can include unexplained data usage and numerous ad pop-ups.
Signup and view all the answers
Being redirected during internet searches can be a sign of adware infection.
Being redirected during internet searches can be a sign of adware infection.
Signup and view all the answers
Downloading any file from a legitimate website is completely safe from Trojan infections.
Downloading any file from a legitimate website is completely safe from Trojan infections.
Signup and view all the answers
Adware only affects desktop computers and cannot be found on mobile devices.
Adware only affects desktop computers and cannot be found on mobile devices.
Signup and view all the answers
Software malfunctions such as slowdowns and mysterious settings changes can be signs of a rootkit.
Software malfunctions such as slowdowns and mysterious settings changes can be signs of a rootkit.
Signup and view all the answers
A rootkit will always cause your antivirus software to deactivate.
A rootkit will always cause your antivirus software to deactivate.
Signup and view all the answers
Running an anti-rootkit scan is unnecessary if your antivirus is functioning properly.
Running an anti-rootkit scan is unnecessary if your antivirus is functioning properly.
Signup and view all the answers
Removing a rootkit may require the reinstallation of cybersecurity software after scanning.
Removing a rootkit may require the reinstallation of cybersecurity software after scanning.
Signup and view all the answers
Antivirus crashes are a definitive indicator of a rootkit infection.
Antivirus crashes are a definitive indicator of a rootkit infection.
Signup and view all the answers
Study Notes
Malicious Software Overview
- Malicious Software (Malware) is any program that causes harm.
- Malware Attacks involve inserting malicious code to disrupt or destroy a system.
- Types of Malware: Viruses, Worms, Trojans, Spyware, Adware, Rootkits.
Computer Virus
- A computer virus self-replicates and attaches to files or programs.
- Virus Activation: Executions occurs when the host file is opened.
- Two types of Viruses: Non-resident and Resident.
Non-Resident Virus
- Non-resident viruses do not reside in computer memory.
- They infect executable files when programs are not running.
- They immediately search for other hosts to infect.
- They transfer control to the infected application program.
Resident Virus
- Resident viruses reside in computer memory.
- They attack any file or application, including antivirus software.
- Sources: Corrupted drives, disks, suspicious links, or downloads.
Worms
- A worm is a self-replicating computer virus.
- Network Propagation: Worms spread through networks without user interaction.
- Impact: They do not delete system files, modify existing files, install Trojans, or capture user credentials.
"I LOVE YOU" Virus
- Common Name: Love Letter.
- Type: Computer worm.
- Operating System: Microsoft Windows.
- Written in: VBScript.
- Responsible: Onel de Guzman, a Filipino programmer.
- Transmission: Email with subject "ILOVEYOU" and attachment "LOVE-LETTER-FOR-YOU.txt.vbs".
Famous Worms
- Jerusalem: The first known computer worm discovered in 1987.
- Morris Worm: Launched in 1988 by Robert Morris to measure the internet size.
- Storm Worm: Launched in 2007 as fake news about a storm wave, targeting popular websites.
- SQL Slammer: A unique worm, it used random IP addresses to spread.
- Botnet: A network of infected computers controlled by an attacker.
Ransomware
- Ransomware encrypts a victim's data, files, devices, or systems.
- Purpose: To demand ransom payment for decryption.
Trojan Horses
- Trojan Horses are disguised as authentic software.
-
Trojan Horse Functionality:
- Erase or overwrite data.
- Spread other viruses.
- Establish zombie networks for DDoS attacks or spam.
- Steal passwords and credit card numbers (key logger).
- Phish for account details.
- Destroy data.
Trojan Infection Sources
- Websites: Rogue websites.
- Instant Messaging: Files shared through messengers.
- Email: Attachments in emails.
- SMTP: Trojan horses transmitted via SMTP (Simple Mail Transfer Protocol).
- File Extensions: .exe, .com, .scr, .bat, .pif.
Adware
- Adware: Not inherently malicious but breaches user privacy.
- Purpose: Display advertisements.
- Display Methods: Pop-up windows on desktops or inside programs.
- Mobile Infection: Through apps in entertainment and gaming categories.
Adware Infection Signs
- Unexpected changes in browser homepage.
- Incorrect web page displaying.
- Excessive pop-up ads.
- Slow device performance.
- Device crashing.
- Reduced internet speeds.
- Redirected internet searches.
- New toolbar or browser add-ons appearing.
Mobile Adware Infection Signs
- Slow phone performance.
- Slow app loading.
- Quickly draining battery.
- Unknown apps installed.
- Unexplained data usage.
- Higher-than-expected phone bills.
- Frequent ad pop-ups.
Removing Adware
- Create a data backup.
- Download or update security software.
- Uninstall unused programs.
- Use adware removal and cleanup applications.
Spyware
- Spyware: Monitors user actions and collects personal data.
- Installation: Usually installs itself on the user's computer.
- Purpose: Profit by collecting data without user consent.
- Impact: Steals passwords and personal information.
Spyware Types
- Keystroke Loggers: Record user keystrokes to capture sensitive information.
- Screen Capture Programs: Record screen activity.
- Web Browser History Trackers: Track browsing history.
- Packet Sniffers: Monitor network traffic to intercept sensitive information.
- Cookie Droppers: Inject cookies to capture browsing data.
Rootkit
- Rootkit: A type of malware that alters the operating system's functionality stealthily.
- Purpose: To gain unauthorized control over a computer.
Rootkit Capabilities
- Stealthy: Rootkits can hide from traditional security tools.
- Capable: Rootkits can perform various malicious actions.
- Sneaky: Rootkits can spread through deceptive methods like corrupt downloads, spam emails, and exploit kits.
Rootkit Types
- Bootloader Rootkit: Infects the bootloader to gain control before the operating system loads.
- Firmware Rootkit: Hides in firmware making detection difficult.
- Kernel Rootkit: Infects the operating system's kernel, giving attackers significant control.
- Application Rootkit: Modifies files with rootkit code, providing access when infected files are run.
- Memory Rootkit: Resides in RAM, slowing down the computer and performing malicious tasks.
Rootkit Detection and Removal
- System crashes: Rootkits can cause system crashes.
- Software malfunctions: Slowdowns, settings changes, or browser malfunctions.
- Antivirus crashes: Antivirus software may deactivate due to rootkit presence.
- Anti-rootkit scans: Use specialized tools to detect rootkits.
Tips for Staying Safe
- Install antivirus software: Protect your system from malware.
- Keep software up-to-date: Patches fix vulnerabilities.
- Be cautious about downloads: Only download from trusted sources.
- Beware of suspicious emails: Do not open attachments from unknown senders.
- Use strong passwords: Make it harder for attackers to guess your passwords.
- Enable security features: Use firewalls and other security measures.
- Back up your data: Protect your data from loss.
- Be aware of phishing attempts: Recognize and avoid scams.
- Don't click on suspicious links: Only visit trusted websites.
- Stay informed: Keep up with the latest security threats.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz covers the fundamentals of malicious software, commonly known as malware. It explores various types of malware, including computer viruses, worms, and their specific characteristics. Test your knowledge on how these threats operate and the distinct features of non-resident and resident viruses.