What are the three types of malware that have the primary traits of circulation and or infection?

is software that enters a computer system without the user’s knowledge or consent and then performs an unwanted and usually harmful action. Uses a threat vector to deliver a malicious “payload” that performs a harmful function once it is invoked.

Three types of mutating software:

Oligomorphic malware

Polymorphic malware

Metamorphic malware

changes its internal code to one of a set number of predefined mutations whenever it is executed.

code that completely changes from its original form whenever it is executed.

can actually rewrite its own code thus appears different each time it is executed.

One method of classifying the various types of malware is by using primary trait that the malware processes. These traits are:

Circulation

Infection

Concealment

Payload Capabilitie

some malware has its primary trait spreading rapidly to other systems in order to impact a large number of users.

Once the malware reaches a system through circulation, then it must “infect “ or embed itself into that system.

the act of malware trying to avoid detection by concealing itself, while other malware can embed itself within existing processes or modify the underlying host operating system.

: when payload capabilities are the primary focus of malware, the focus is on what nefarious actions the malware performs. (i.e. does it steal passwords, delete programs, etc.)

an agent that reproduces inside a cell.

Three types of malware that have primary traits of circulation and/ or infection are:

malicious computer code that, like is biological counterpart, reproduces itself on the same computer. Viruses replicate itself (or an evolved copy of itself) without any human intervention.

a virus that infects an executable program file.

when the program is launched the virus is “activated”

One of the most common data file viruses that is written in a script is known as

a series of instructions that can be grouped together as a single command

can be written by using a macro language such as Visual Basic for applications (VBA), are stored within the user document (.XLSX) and .Doc

how many different Microsoft Windows File types can be infected with a virus

a virus that first attaches or appends itself to the end of the infected file. it then inserts at the beginning of the file a "jump" instruction that points to the end of the file which is the beginning of the virus code.

viruses that go great lengths to avoid detection is called an

Some of the armored virus infection techniques include

Swiss cheese infection

Split infection

instead of having a single "jump"instruction to the "plain" virus code, some armored viruses perform two actions to make detection more difficult.

instead of inserting pieces of the decryption engine throughout the program code, some viruses split the malicious code itself into several parts (along with the main body of code), and then these parts are placed at random positions through the program code.

each time an infected program is launched or the file is opened - either by user or by computer operating system the virus performs two actions:

1 unloads a payload to perform malicious action

2 reproduces itself by inserting its code into another file on the same computer.

a _______ can only replicate itself on the host computer on which it is located; it cannot automatically spread to another computer by itself.

viruses have two carriers

1 a file to which it attaches

2 human to transport it to other computers

a malicious program that uses a computer network to replicate and (are sometime called network viruses)

designed to enter a computer through a network and then take advantage of vulnerability in an application or an operating system on the host computer

once the ______ has exploited the vulnerability on one system, it immediately searches for another computer on the network that has the same vulnerability

today _____ can leave behind a payload on systems they infect and cause harm, much like a virus (ex. deleting files on a computer or allowing the computer to be remotely controlled by an attacker)

will self replicate between computers (from one computer to another)

will self-replicate on the host computer but not to other computers

an executable program that masquerades as performing a benign activity but also does something malicious

unlike a virus that infects a system without the user's knowledge or consent, a _________ program is installed on the computer system with the user's knowledge..what the __ conceals is its malicious payload

a set of software tools used to hide the actions or presence of other types of software (also hide or remove all traces of evidence that reveal the malware, such as log entries

primary payload capabilities are to collect data, delete data, modify system security settings, and launch attacks

used to describe software that secretly spies on users by collecting information without their consent

one type of nefarious software is a _____ that silently captures and stores each keystroke that a user types on the computers keyboard (can be a small device or software program)

this embeds itself into a computer so that the message cannot be closed and rebooting the computer has no effect

Which of the following malware has circulation infection as their primary trait?

25 Cards in this Set.

What are the primary traits of malware?

The primary characteristic of a computer virus is malicious software that cybercriminals program to reproduce. It usually does so by attacking and infecting existing files on the target system. Viruses must execute to do their dirty work, so they target any type of file that the system can execute.

What are three types of malware and then explain them in more detail?

What are the Types of Malware?.

What are 3 of the most common signs that your computer has been compromised by malware?

How do I know that my computer is hacked?.
Frequent pop-up windows, especially the ones that encourage you to visit unusual sites, or download antivirus or other software..
Changes to your home page..
Mass emails being sent from your email account..
Frequent crashes or unusually slow computer performance..