Malicious Code Types
12 Questions
3 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary goal of pharming attacks?

  • To wiretap email traffic
  • To redirect users to a fake website and steal sensitive information (correct)
  • To eavesdrop on network communications
  • To steal credit card information

What is the term for attacks that originate from inside a business?

  • Phishing attacks
  • Cracker attacks
  • Sniffing attacks
  • Insider attacks (correct)

What is the term for malicious apps that contain adware?

  • Madware (correct)
  • Vishing
  • Malware
  • Smishing

What is the purpose of email wiretaps?

<p>To record email traffic at the mail server (A)</p> Signup and view all the answers

What is the primary security risk associated with mobile platforms?

<p>Same risks as any Internet device (D)</p> Signup and view all the answers

What is the term for a type of attack that targets merchant servers and uses stolen data to establish credit under false identities?

<p>Credit card fraud/theft (A)</p> Signup and view all the answers

What is the primary characteristic of a virus?

<p>It has the ability to replicate and spread to other files (D)</p> Signup and view all the answers

What is the term for a malicious code that can be covertly installed on one or more computers when attached to the Internet?

<p>Bot (C)</p> Signup and view all the answers

What is the goal of phishing attacks?

<p>To obtain confidential information for financial gain (B)</p> Signup and view all the answers

What is the term for a web site that seems legitimate but fools users into entering financial data?

<p>Spoofing (A)</p> Signup and view all the answers

What is the term for exploiting human fallibility and gullibility to distribute malware?

<p>Social engineering (C)</p> Signup and view all the answers

What is the result of a computer being infected with a bot?

<p>It becomes a zombie (A)</p> Signup and view all the answers

Study Notes

Malicious Code

  • Viruses: replicate and spread to other files, can be benign or destructive
  • Worms: spread from computer to computer without activation needed
  • Trojan horses: hide viruses or malicious code, e.g., fake links
  • Drive-by downloads: malware comes with downloaded files requested by users
  • Backdoors: allow remote access to compromised computers
  • Bots and botnets: malware that responds to external commands, turning computers into "zombies"

Phishing and Scams

  • Phishing: deceptive online attempts to obtain confidential info for financial gain
  • Spear phishing: targets specific business customers
  • Spoofing: creating fake websites to deceive users into entering financial data
  • Email scams: fraudulent emails to obtain sensitive information
  • Social engineering: exploiting human fallibility to distribute malware
  • Identity theft: stealing personal info for financial gain

Data Breach and Fraud

  • Data breach: losing control over corporate info to outsiders
  • Credit card fraud/theft: hackers target merchant servers, establish credit under false identities
  • Pharming: redirecting web links to fake sites, stealing info

Network and Device Security

  • Sniffing: eavesdropping on network info, including email wiretaps
  • Insider attacks: attacks from within a business (most frequent type of attack)
  • Mobile platform security issues: same risks as any internet device
  • Vishing: targeting cell phone users with verbal scams
  • Smishing: exploiting SMS messages
  • Madware: innocent-looking apps with adware

Cloud Security

  • Cloud security issues: major issues with Dropbox, including username and password theft, and iOS app security holes
  • DDoS attacks: threatening availability of cloud services

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

Learn about different types of malicious code, including viruses, worms, Trojan horses, drive-by downloads, backdoors, and bots. Understand their characteristics and how they spread.

More Like This

Identifying Malware on Your Computer
21 questions
Gray Hat Hackers and Malware
16 questions

Gray Hat Hackers and Malware

GutsyAquamarine3939 avatar
GutsyAquamarine3939
Use Quizgecko on...
Browser
Browser