• Barajar
    Activar
    Desactivar
  • Alphabetizar
    Activar
    Desactivar
  • Frente Primero
    Activar
    Desactivar
  • Ambos lados
    Activar
    Desactivar
  • Leer
    Activar
    Desactivar
Leyendo...
Frente

Cómo estudiar sus tarjetas

Teclas de Derecha/Izquierda: Navegar entre tarjetas.tecla derechatecla izquierda

Teclas Arriba/Abajo: Colvea la carta entre frente y dorso.tecla abajotecla arriba

Tecla H: Muestra pista (3er lado).tecla h

Tecla N: Lea el texto en voz.tecla n

image

Boton play

image

Boton play

image

Progreso

1/30

Click para voltear

30 Cartas en este set

  • Frente
  • Atrás
Malware
Malicious software used to cause damage or
gain unauthorized access to systems.
To determine whether a system has been infected, examine the following critical areas:
Memory
Registries
Macros
Virus
A piece of malicious code that spreads to other
computers by design, although some viruses also damage the systems on which they reside. Viruses can spread immediately upon being received or can implement other unwanted actions, or they can lie dormant until a trigger in their code causes them to become active. The hidden code a virus executes is called its payload.
How do virus execute?
Viruses are executed by some type of action, such as running a program
Resident virus:
This type of virus resides in memory, which means it
is loaded each time the system starts and can infect other areas based on specific actions.
Nonresident virus:
Once executed, this type of virus looks for targets locally and also across the network. The virus then infects those areas and exits. Unlike a resident virus, it does not remain active.
Boot sector virus
This type of virus is placed into the first sector of the hard drive so that when the computer boots, the virus loads into memory. As a result, the virus loads before the operating system even starts.
Macro virus
This type of virus is inserted into a Microsoft Office document and emailed to unsuspecting users
Program- and file-infecting virus
The virus infects executable program files and becomes active in memory. It then seeks out other files to infect. This type of virus is easily identified by its binary pattern, or signature, which works essentially like a fingerprint.
Polymorphic virus:
Change form or signature each time it is executed to avoid detection.
Armored Virus
go one step further by making it difficult to analyze functions, creating a metaphorical layer of armor around the virus and try to prevent
disassembly and debugging.
Stealth virus:
This memory-resident virus also uses techniques toavoid detection, such as temporarily removing itself from an infected file or masking a file’s size.
Multipartite virus
A multipartite virus infects executable files and also attacks the master boot record of the system.
Fileless virus
A multipartite virus infects executable files and also attacks the master boot record of the system.
Worms
are self-replicating and do not need a host file.
Trojans
are programs disguised as
useful applications.
Backdoor Trojans
open a less obvious entry (or backdoor) into the system for later access.
Downloader Trojans
download additional, often malicious, software onto infected systems.
Keylogger Trojans
monitor and send keystrokes typed from an infected machine. Trojans can download other Trojans as well
Trojans Infostealer
attempt to steal information from the infected machine
Rootkit
A piece of software that can be installed and
hidden on a computer, mainly for the purpose of
compromising the system.
How a Rootkit can be installed?
Rootkits can be included as part of software
packages, can be installed through an unpatched
vulnerability, or can be downloaded and installed by
users.
Logic bomb
A virus or Trojan horse designed to execute malicious actions when a certain event occurs or when a specified period of time goes by.
Bot
is an automated computer program that needs no user interaction.
Botnet
is a large number of computers that forward transmissions to other computers on the Internet.
crypto-malware
Malware that is specifically designed to find potentially valuable data on a system and encrypt it.
A potentially unwanted program (PUP)
Is a program that is most likely unwanted, despite the possibility that users consented to download it.
Spyware
is software that communicates information from a user’s system to another party without notifying the user.
Adware
is a form of spyware that gives advertisers an online way to make a sale.
Cryptojacking
Compromises a victim’s computer and uses its resources to mine for cryptocurrency