Named attacks/malware
Vocabulary
Types of malware
Types of malware 2
Misc.
100

a time bomb was designed to infect DOS systems, more specifically the master boot record of the hard disk and the boot sector of floppy disks

What is Michelangelo?

100

location and methods that could constitute a security risk

What is an attack surface?

100

malicious software code that is unleased and attempts to preform its destructive content

What is virus?

100

Deploys to prevent security analysts from reading the source code by attempting to prevent access to or disassembled of the code itself 

What is an armored virus?

100

Most cyberattacks come from this place

What is Russia/Ukraine? 

200

A logic bomb that specifically targets programmable logic controllers which allow the automation of electromechanical processes such as those used to control machinery and industrial processes including gas centrifuges for separating nuclear material 

What is Stuxnet?

200

Small text files saved on the computer for web browsers and websites 

What is a cookie?

200

Malware that moves from one computer to another through computer networks and/or open network connection

What is a worm?

200

Encrypts data so user cannot access it until a fee is paid to the hacker

What is ransomware?

200

Weakest link in a security chain 

What is a user?

300

Ransomware where it made a hospital pay 17k

What is Hollywood Presbyterian Hospital?

300

a secret or unknown access point into a system

What is a backdoor?

300

Malware hidden inside other software that appears harmless

What is a Trojan Horse?

300

Changes its characteristics to avoid directions from an antivirus programs

What is a polymorphic virus?

300

The most common type of malware

What is a virus?

400

a Trojan horse that infected computers, sometimes turning them into zombies or bots to continue the spread of the virus and to send a huge amount of spam mail

What is Storm Worm?

400

a computer-software vulnerability either unknown to those who should be interested in its mitigation or known and a patch has not been developed

What is a zero-day vulnerability?

400

Deploys its payload when a date or time occurs

What is a time bomb?

400

Virus that infects a computer before the operating system loads

What is a rootkit?

400

Is the best defense against malware

What is prevention?

500

A virus that did an estimated $38 billion in damages in 2004

What is the Mydoom virus?

500

using social skills, tools, and techniques to obtain personal information

What is social engineering? 

500

Deploys when conditions exists that the malware is seeking

What is a logic bomb?

500

Technology that tracks a user’s keystrokes on the keyboard

What is a keylogger?

500

An approach to finding previously undetected unwanted programs or variants of known viruses

What is heuristic methodology?

M
e
n
u