- Barajar
ActivarDesactivar
- Alphabetizar
ActivarDesactivar
- Frente Primero
ActivarDesactivar
- Ambos lados
ActivarDesactivar
- Leer
ActivarDesactivar
Leyendo...
Cómo estudiar sus tarjetas
Teclas de Derecha/Izquierda: Navegar entre tarjetas.tecla derechatecla izquierda
Teclas Arriba/Abajo: Colvea la carta entre frente y dorso.tecla abajotecla arriba
Tecla H: Muestra pista (3er lado).tecla h
Tecla N: Lea el texto en voz.tecla n
Boton play
Boton play
30 Cartas en este set
- Frente
- Atrás
Malware
|
Malicious software used to cause damage or
gain unauthorized access to systems. |
To determine whether a system has been infected, examine the following critical areas:
|
Memory
Registries Macros |
Virus
|
A piece of malicious code that spreads to other
computers by design, although some viruses also damage the systems on which they reside. Viruses can spread immediately upon being received or can implement other unwanted actions, or they can lie dormant until a trigger in their code causes them to become active. The hidden code a virus executes is called its payload. |
How do virus execute?
|
Viruses are executed by some type of action, such as running a program
|
Resident virus:
|
This type of virus resides in memory, which means it
is loaded each time the system starts and can infect other areas based on specific actions. |
Nonresident virus:
|
Once executed, this type of virus looks for targets locally and also across the network. The virus then infects those areas and exits. Unlike a resident virus, it does not remain active.
|
Boot sector virus
|
This type of virus is placed into the first sector of the hard drive so that when the computer boots, the virus loads into memory. As a result, the virus loads before the operating system even starts.
|
Macro virus
|
This type of virus is inserted into a Microsoft Office document and emailed to unsuspecting users
|
Program- and file-infecting virus
|
The virus infects executable program files and becomes active in memory. It then seeks out other files to infect. This type of virus is easily identified by its binary pattern, or signature, which works essentially like a fingerprint.
|
Polymorphic virus:
|
Change form or signature each time it is executed to avoid detection.
|
Armored Virus
|
go one step further by making it difficult to analyze functions, creating a metaphorical layer of armor around the virus and try to prevent
disassembly and debugging. |
Stealth virus:
|
This memory-resident virus also uses techniques toavoid detection, such as temporarily removing itself from an infected file or masking a file’s size.
|
Multipartite virus
|
A multipartite virus infects executable files and also attacks the master boot record of the system.
|
Fileless virus
|
A multipartite virus infects executable files and also attacks the master boot record of the system.
|
Worms
|
are self-replicating and do not need a host file.
|
Trojans
|
are programs disguised as
useful applications. |
Backdoor Trojans
|
open a less obvious entry (or backdoor) into the system for later access.
|
Downloader Trojans
|
download additional, often malicious, software onto infected systems.
|
Keylogger Trojans
|
monitor and send keystrokes typed from an infected machine. Trojans can download other Trojans as well
|
Trojans Infostealer
|
attempt to steal information from the infected machine
|
Rootkit
|
A piece of software that can be installed and
hidden on a computer, mainly for the purpose of compromising the system. |
How a Rootkit can be installed?
|
Rootkits can be included as part of software
packages, can be installed through an unpatched vulnerability, or can be downloaded and installed by users. |
Logic bomb
|
A virus or Trojan horse designed to execute malicious actions when a certain event occurs or when a specified period of time goes by.
|
Bot
|
is an automated computer program that needs no user interaction.
|
Botnet
|
is a large number of computers that forward transmissions to other computers on the Internet.
|
crypto-malware
|
Malware that is specifically designed to find potentially valuable data on a system and encrypt it.
|
A potentially unwanted program (PUP)
|
Is a program that is most likely unwanted, despite the possibility that users consented to download it.
|
Spyware
|
is software that communicates information from a user’s system to another party without notifying the user.
|
Adware
|
is a form of spyware that gives advertisers an online way to make a sale.
|
Cryptojacking
|
Compromises a victim’s computer and uses its resources to mine for cryptocurrency
|