Vac - Fundamentals of Information Security
Vac - Fundamentals of Information Security
Malware :
TYPES OF MALWARE:
Here are the most common offenders in the rogues’ gallery of malware:
● Adware is unwanted software designed to throw advertisements up on your
screen, most often within a web browser. Typically, it uses an underhanded
method to either disguise itself as legitimate, or piggyback on another program
to trick you into installing it on your PC, tablet, or mobile device.
● Spyware is malware that secretly observes the computer user’s activities
without permission and reports it to the software’s author.
● A virus is malware that attaches to another program and, when executed—
usually inadvertently by the user—replicates itself by modif ying other computer
programs and infecting them with its own bits of code.
● Worms are a type of malware similar to viruses. Like viruses, worms are self -
replicating. The big difference is that worms can spread across systems on
their own, whereas viruses need some sort of action from a user in order to
initiate the infection.
● A Troj an, or Troj an horse, is one of the most dangerous malware types. It
usually represents itself as something useful in order to trick you. Once it’s on
your system, the attackers behind the Troj an gain unauthorized access to the
affected computer. From there, Troj ans can be used to steal financial
information or install other forms of malware, often ransomware.
● Ransomware is a form of malware that locks you out of your device and/or
encrypts your files, then forces you to pay a ransom to regain access. Ransomware
has been called the cybercriminal’s weapon of choice because it demands a
quick, profitable payment in hard-to-trace cryptocurrency. The code behind
ransomware is easy to obtain through online criminal marketplaces and
defending against it is very difficult. While ransomware attacks on individual
consumers are down at the moment, attacks on businesses are up 365 percent
for 2019. As an example, the Ryuk ransomware specifically targets high-
profile organizations that are more likely to pay out large ransoms. For more,
check out the Malwarebytes Labs Ransomware Retrospective.
● Rootkit is a form of malware that provides the attacker with administrator
privileges on the infected system, also known as “root” access. Typically, it is
also designed to stay hidden from the user, other software on the system, and
the operating system itself .
● A keylogger is malware that records all the user’s keystrokes on the keyboard,
typically storing the gathered information and sending it to the attacker, who is
seeking sensitive information like usernames, passwords, or credit card details.
● Malicious cryptomining, also sometimes called drive-by mining
or cryptoj acking, is an increasingly prevalent malware usually installed by a
Troj an. It allows someone else to use your computer to mine cryptocurrency like
Bitcoin or Monero. So instead of letting you cash in on your own computer’s
horsepower, the cryptominers send the collected coins into their own account
and not yours. Essentially, a malicious cryptominer is stealing your resources to
make money.
● Exploits are a type of malware that takes advantage of bugs
and vulnerabilities in a system in order to give the attacker access to your
system. While there, the attacker might steal your data or drop some form of
malware. A zero-day exploit refers to a software vulnerability for which there
is currently no available defense or fix.
●Viruses: Viruses are self -replicating and spread from one system to another by
attaching themselves to legitimate files or programs. They can infect multiple files
and are designed to propagate, making it critical to know how to determine if your
computer has a virus.
●Troj ans: Unlike viruses, Troj ans do not replicate on their own. Instead, they rely on
deception to be manually installed by unsuspecting users. They often disguise
themselves as harmless or even beneficial applications. But once a Troj an is executed,
it can perform various nefarious actions without the user's knowledge.
What types of Troj an viruses exist, and how are they harmful?
Troj ans are incredibly dangerous due to the wide range of malicious tasks they can
perform once installed on a computer. Here are some common types of Troj an horse
malware:
●Backdoor Troj an: These Troj ans create a "backdoor" on the victim's computer, granting
attackers unauthorized access. This backdoor allows them to control the system, steal
data, and introduce more malware.
●Infostealer Troj an: As the name suggests, this type of Troj an steals sensitive data
from the victim's computer, like passwords, credit card information, or personal files.
●Remote Access Troj an (RAT): This Troj an gives the attacker complete control over the
victim's computer, effectively turning it into a tool for cybercriminals to exploit.
●Distributed Denial of Service (DDoS) Attack Troj ans: These Troj ans perform DDoS
attacks, flooding a network with traffic to overwhelm and crash it.
The harm that Troj ans can cause extends beyond j ust individual computers.
Cybercriminals can use Troj ans to create a botnet, which is a network of infected
computers that a malicious actor can remotely control to spread malware or stage other
online attacks.
To help safeguard your device against malicious threats, Norton AntiVirus Plus offers
a comprehensive suite of security features, like advanced threat protection and a
smart firewall, designed to help protect your personal information and computer against
Troj ans, viruses, and other malware.
How to get rid of the Troj an?
If you think your computer is infected with Troj an malware, it's crucial to remove it
right away. Follow the steps below to help get rid of a Troj an:
1.Disconnect your computer from the internet: Going “offline” helps to prevent the
malware from communicating with its command-and-control servers, limiting further
harm.
2.Install a reputable antivirus tool: A trusted tool such as Norton AntiVirus Plus will
help you detect and remove Troj ans to help keep your system safer.
3.Perform a full system scan: Use your antivirus tool to help detect and quarantine
malicious files.
4.Delete infected files: After your antivirus identifies and isolates malicious files, follow
the prompts to delete the files permanently.
5.Update your operating system and software: Keeping your devices and software up to
date can help protect against future malware infections. Cybercriminals often exploit
vulnerabilities in outdated software to launch attacks.
6.Download programs from trusted sources: Stick to official app stores and trusted
websites when shopping for applications. Learn how to identif y the signs you’re on
a malicious websites so you know how to avoid them next time.
7.Use a firewall: Many devices come with a built-in firewall. Ensure it's active to add
an extra layer of protection against unauthorized access.
Finally, do your homework on how to avoid viruses —knowing what to look out for will
help you keep your device free of harmful software in the future.
Highly versatile forms of malware, Troj an horses can carry out various malicious
activities. Here are some common actions that Troj ans might perform:
●Breach data: Troj ans can steal sensitive data from your computer, such as login
credentials, credit card details, and personal files.
●Botnet recruitment: Some Troj an horses are designed to convert infected computers and
pull them into a botnet that cybercriminals can control remotely.
●Data destruction: Certain Troj ans may be programmed to delete files, corrupt data, or
even reformat entire hard drives.
●Espionage: Troj an horses can be used to monitor a user's activities, capture screenshots,
and record keystrokes to gather sensitive information covertly.
●Zeus: The Zeus Troj an orchestrates sophisticated attacks to acquire crucial banking
credentials and extract sensitive financial data. Its precision has made it a popular
choice for cybercriminals, leaving a wake of compromised financial systems since
peaking in the early 2010s.
●Emotet: Emotet started as a banking Troj an but was quickly adapted to help execute
different kinds of cyberattacks. It can spread various types of malware,
including ransomware, and is highly unpredictable and difficult to detect.
6. In Mid-1981, The 1st Virus For Apple Computers With The Name _________ Came
Into Existence.
a) Apple i
b) Apple Ii
c) Apple Iii
d) Apple Virus
7. The Virus Hides Itself From Getting Detected By ______ Different Ways.
a) 2
b) 3
c) 4
d) 5
15.One Who Gains Unauthorized Access, Destroy Vital Data Denies Leigitimate User’s
Service Or Causes Problems For Their Target Is Called
a)White Hacker
b)Cracker
c)Programmer
d)Data Base Administrator
18. Losses Between The Floors Of The Building Can Be Determined Using ________
a) Internal Dimensions
b) Material Used To Create Antenna
c) External Dimension
d) Line Of Sight Path
19. Technique Of Drawing a Single Ray Between The Transmitter And Receiver Is
Called ______
a) Secondary Ray Tracing
b) Primary Ray Tracing
c) Line Of Sight
d) Straight Line Tracing
a) Spywar e
b) Ransomwar e
c) Adwar e
d)Rootkit