This type of software is designed to do harm
What is Malware?
This software secretly monitors and collects personal information about users and sends it elsewhere
Spyware
This malware is named after a Greek myth because it disguises itself as legitimate software.
What is a Trojan
This malware locks a victim's data and demands payment to release it.
What is Ransomware?
This software records everything you type to steal passwords and credit card info.
What is a keylogger?
This type of malware requires user interaction or an "authorized program" to spread.
What is a Virus?
This type of spyware can pop ads or collect information about the user's web-surfing and consumer habits
Adware
This specific type of Trojan allows an attacker to control a victim's host remotely.
What is a RAT?
This specific sub-type of ransomware threatens to release stolen data publicly.
What is doxware?
This is the most common way Trojans enter a system (name two methods).
What are email attachments and free downloads?
Unlike a virus, this malware can self-replicate and spread across networks independently.
What is a worm?
This type of software is malicious, provides little or no benefit, and is sold using scare tactics
Scareware
It’s a method of bypassing normal security controls to access a system or data.
What is a backdoor?
This malware gains administrative access and hides its presence by altering system files.
What is a Rootkit?
Manufacturers pre-install this on devices to generate revenue, but it slows them down.
What is bloatware?
This type of malware hijacks a computer's CPU cycles to mine for digital currency.
What is crypto-malware?
This malware locks you out of all your programs and data, and demands payment before allowing access
Ransomware
These are all examples of this concept: missing files, odd entries, strange file names, and slowed proccessing.
What are indication of compromise?
This "malware" uses fake antivirus alerts to trick users into paying for a "fix."
What is scarware?
This type of person is the weak link in the mitigation process.
What are employees?
This tool helps protect against keyloggers because it allows a user to log in without manually typing their saved password each time.
What is a password manager?
This malware is a type of trojan horse that lies idle until triggered by an event
Time bombs or Logic bombs
Developed by H.D. Moore in 2003, this premier open-source framework allows security researchers to find, exploit, and validate vulnerabilities using a massive database of payloads like Meterpreter.
What is metasploit?
This person is the most likely culprit to install a logic bomb.
What is a disgruntled employee or insider threat?
This "safe zone" or isolated virtual environment is where analysts execute malware to watch its behavior without risking the host system.
What is a sandbox?