Malware is a combination of these two words.
What is malicious + software?
A computer virus typically attaches itself to one of these.
What is a host file (like a program file)?
This method compares a program’s binary pattern to a database of known malware.
What is signature detection?
A Trojan disguises itself as something helpful, much like this famous object from Greek mythology.
What is the Trojan Horse?
This type of malware locks or threatens to delete your files unless you pay money.
What is ransomware?
Many people call all malware this name, but technically that’s incorrect.
What is a virus?
Two common methods viruses spread are through these.
What are email attachments and backing storage devices (like USBs)?
This type of detection watches for suspicious behavior instead of known code.
What is heuristic detection?
Unlike viruses, Trojans do NOT do this.
What is self-replicate?
Businesses hit by ransomware may suffer more damage than the ransom itself, including this type of damage.
What is financial and reputational damage?
This class of malware can include viruses, Trojans, worms, and ransomware.
What is malware?
A virus that hides by inserting dummy code or rearranging itself is called this.
What is a stealth virus?
This method uses a mathematical hash of a file to see if it has been altered.
What is checksum verification?
This type of Trojan disables security or creates hidden ways for hackers to access a system.
What is a Backdoor Trojan?
This type of spyware records every keystroke a user enters.
What is a keylogger?
Malware can range from mild inconvenience to this extreme outcome.
What is crippling computer systems and widespread disruption?
This type of virus attacks the part of a disk used to start up a computer.
What is a boot sector virus?
This trade-off of anti-virus programs occurs because they constantly scan files in memory.
What is slower performance / resource drain?
Unlike viruses, worms don’t need a host file to spread; instead, they exploit these.
What are system vulnerabilities?
Criminals can secretly turn on these two built-in computer features to spy on users.
What are webcams and microphones?
nlike malware, this type of software is specifically designed to protect systems.
What is anti-virus (or anti-malware) software?
This famous virus waited for a specific calendar date before deleting all files.
What is the Friday the 13th virus?
SHA and MD5 are examples of these mathematical techniques used in checksum detection.
What are hashing algorithms?
Some worms don’t carry malicious code, but cause damage by doing this excessively.
What is replicating at a massive rate (using up memory, storage, or bandwidth)?
This low-tech method, used by Mark Zuckerberg, helps prevent webcam spying.
What is putting tape over the webcam?