Types of Malware and Cyber Threats

LawfulLion avatar
LawfulLion
·
·
Download

Start Quiz

Study Flashcards

10 Questions

What type of malware demands payment in exchange for restoring access to a computer or data?

Ransomware

Which type of malware replicates itself in the active memory of a computer?

Worm

What term is used to describe a program that contains malicious code inside a seemingly harmless program?

Trojan horse

Which type of malware is disguised as something else, causing a computer to behave in an unexpected and usually undesirable manner?

Virus

What type of malware does not replicate itself, but rather causes a computer to behave in an unexpected and usually undesirable manner?

Virus

What does the federal law address related to computers?

Fraud and related activities in association with computers

What is the main focus of the CIA security triad?

Confidentiality, integrity, and availability

What does confidentiality ensure in the CIA security triad?

Only authorized individuals can access sensitive data

What does integrity ensure in the CIA security triad?

Data can only be changed by authorized users

What aspect of the CIA security triad ensures data can be accessed when needed?

Availability

Study Notes

Types of Exploits

  • Ransomware: Malware that restricts access to computer or data until demands are met, often involving payment of a ransom
  • Virus: A piece of code disguised as a legitimate program, causing a computer to behave unexpectedly and undesirably
  • Worm: A harmful program that resides in active memory, duplicating itself to spread harm
  • Trojan horse: A program that conceals malicious code within a seemingly harmless program

Federal Laws for Prosecuting Computer Attacks

  • Addresses fraud and related activities associated with computers
  • Covers false claims regarding unauthorized use of credit cards
  • Focuses on unlawful access to stored communications to obtain, alter, or prevent authorized access to a wire or electronic communication while it is in electronic storage

CIA Security Triad

  • Refers to the confidentiality, integrity, and availability of systems and data
  • Confidentiality: ensures only authorized individuals can access sensitive data
  • Integrity: ensures data can only be changed by authorized users
  • Availability: ensures data can be accessed when and where needed

Learn about the different types of cyber threats, including ransomware, viruses, worms, and Trojan horses. Understand how they work and how to protect yourself from these malicious programs.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Use Quizgecko on...
Browser
Browser