Main menu

Glossary of Malware Terms

Malware-related terms explicitly mentioned in the CompTIA Security+ SY0-701 exam objectives are marked in red.

ActiveX controls
A type of downloadable web browser plug-ins for Microsoft Internet Explorer providing additional interactive features to web pages. Malicious ActiveX controls pose a risk of unintended execution of malware.
Adware
Software that automatically plays, displays, or downloads advertisements to a computer.
Armored virus
A type of computer virus that takes advantage of various mechanisms specifically designed to make tracing, disassembling and reverse engineering its code more difficult.
Backdoor
An undocumented (and often legitimate) way of gaining access to a program, online service, or an entire computer system.
Bloatware
A type of pre-installed, typically unwanted software that consumes system resources and provides little to no value to the user.
Bot
A malware-infected networked host under remote control of a hacker.
Botnet
A group of compromised computers running malicious software under control of a hacker.
Buffer overflow
A technique used by certain types of malware to cause an error in a program and make it easier to run malicious code.
Command and Control (C2 or C&C) server
A computer controlled by an attacker used to send commands to systems compromised by malware.
Companion virus
An older type of computer virus which does not alter files and works by creating infected companion file with the exact same name as the legitimate program, but with different file extension. The virus takes advantage of the fact that in the old MS-DOS command-line interface executables can be run by providing only the file name which facilitates the execution of infected code by an unaware user.
Cross-site scripting
A computer security vulnerability allowing attackers to insert malicious code into a trusted website.
Cryptomalware
Malware that restricts access to a computer system by encrypting data.
Dialer
A rogue application designed to exploit dialup connections by making unauthorized telephone calls.
Downloader
A type of Trojan designed to transfer other malware onto a PC via Internet connection.
Drive-by download
An automatic download performed without the user's consent (and often without any notice) aimed at installing malware or potentially unwanted programs.
Dropper
A type of Trojan designed to install other malware files onto a PC without the need for an active Internet connection.
Executable file
A type of computer file that when opened runs a program or series of instructions contained in the file.
Exploit
Computer code or command that takes advantage of software design flaws.
Fileless Virus
A type of virus that resides only in Random-Access Memory (RAM).
Grayware
A category of applications which, despite not being classified as malware, can worsen the performance of a computer and pose security risk.
Heuristics
A method employed by many computer antivirus programs designed to detect previously unknown types of malware.
iframe
An HTML tag for embedding another web document within the current HTML web page. The downside of utilizing iframes relates to the fact that they can be used for the purpose of injecting malicious code (often in the form of JavaScript applet) into an otherwise trusted page.
Keylogger
An application collecting information about user keyboard activity. Typically, malicious keyloggers are installed and run on a system without the user's knowledge/consent to steal logon credentials, credit card numbers, and other sensitive data.
Logic bomb
Malicious code activated by a specific event.
Macro virus
A type of computer virus that exploits the capability for creating and embedding simple scripts in popular office and cooperative applications.
Malicious app
Mobile application designed to harm user devices or personal data acting in disguise of a legitimate program.
Malicious update
A type of malware that can be installed through a seemingly legitimate software update. The introduction of a malicious update into the application code can be enabled through various means, including unsigned application code, unencrypted update channel (HTTP vs HTTPS), fake update website, unauthorized access to update server, or compromised software development process.
Malicious USB cable
A deceptive hardware accessory that appears normal but contains hidden functionalities designed to compromise connected devices or steal data.
Malware
A generic term for various types of malicious software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. The category of malware encompasses all sorts of malicious applications, including Trojan horses, most rootkits and backdoors, computer viruses, worms, spyware, keyloggers, more intrusive forms of adware, and other malicious programs.
Payload
The part of malware performing malicious action.
Phage virus
A type of computer virus that deletes or corrupts the contents of the target host file instead of attaching itself to the file.
Polymorphic malware
A type of malicious software capable of changing its underlying code in order to avoid detection.
Pop-under
One of the ways of delivering online advertising content utilized by adware. Advertising pop-unders are usually displayed in a new browser window hidden beneath the current page and are not seen until the covering window is closed.
Pop-up
One of the ways of delivering online advertising content utilized by adware. Advertising pop-ups are usually displayed in a new web browser window and cover the contents of the current page.
Potentially Unwanted Program (PUP)
A computer program not explicitly classified as malware by an antivirus software. Although PUPs are legal apps typically downloaded and installed with the user's consent, they may adversely affect computer's security and performance, compromise user's privacy, or cause nuisance by displaying unsolicited ads.
Quarantine
The process of isolating files and applications suspected of containing malware to prevent further execution and potential harm to the user's system.
Ransomware
Malware that restricts access to a computer system by encrypting files or locking the entire system down until the user performs the requested action.
Remote Access Trojan (RAT)
A type of Trojan that enables unauthorized remote access to a compromised system.
Replication
The process by which a virus makes copies of itself to carry out subsequent infections.
Retrovirus
A computer virus that actively attacks an antivirus program in an effort to prevent detection.
Rootkit
A collection of software tools used by a hacker in order to mask intrusion and obtain administrator-level access to a computer or computer network.
Sandboxing
A mechanism for safe execution of untested code or untrusted applications.
Signature file
A file containing new malicious code patterns used by the antivirus application as a reference in the process of malware removal.
Spyware
Malicious software collecting information about users without their knowledge/consent.
SQL injection
Execution of SQL commands aimed at gaining unauthorized access to an online database. This type of attack occurs when, for example, entry fields of web forms designed to collect information from users allow passing unchecked user input to the database. The countermeasure against this type of code injection is input validation, which limits the scope of user input that can be passed through an online form.
Trojan horse
Malicious software performing unwanted and harmful actions in disguise of a legitimate and useful program.
Virus
A computer program containing malicious segment that attaches itself to an application program or other executable component.
Windows Defender
A built-in application tool for Microsoft operating systems providing protection against viruses, spyware, and other potentially unwanted programs.
Worm
A standalone malicious computer program that replicates itself over a computer network.
XSS
A shorthand term for cross-site scripting.
Zero-day attack
A type of attack exploiting vulnerabilities that are present in already released software but unknown to the software developer.
Zombie
A computer compromised by a virus or Trojan horse that puts it under the remote control of an online hijacker.

CompTIA Security+ certification exam SY0-701 malware attacks quiz (11 questions)

General malware quiz (55 questions)

 

sale-70-410-exam    | Exam-200-125-pdf    | we-sale-70-410-exam    | hot-sale-70-410-exam    | Latest-exam-700-603-Dumps    | Dumps-98-363-exams-date    | Certs-200-125-date    | Dumps-300-075-exams-date    | hot-sale-book-C8010-726-book    | Hot-Sale-200-310-Exam    | Exam-Description-200-310-dumps?    | hot-sale-book-200-125-book    | Latest-Updated-300-209-Exam    | Dumps-210-260-exams-date    | Download-200-125-Exam-PDF    | Exam-Description-300-101-dumps    | Certs-300-101-date    | Hot-Sale-300-075-Exam    | Latest-exam-200-125-Dumps    | Exam-Description-200-125-dumps    | Latest-Updated-300-075-Exam    | hot-sale-book-210-260-book    | Dumps-200-901-exams-date    | Certs-200-901-date    | Latest-exam-1Z0-062-Dumps    | Hot-Sale-1Z0-062-Exam    | Certs-CSSLP-date    | 100%-Pass-70-383-Exams    | Latest-JN0-360-real-exam-questions    | 100%-Pass-4A0-100-Real-Exam-Questions    | Dumps-300-135-exams-date    | Passed-200-105-Tech-Exams    | Latest-Updated-200-310-Exam    | Download-300-070-Exam-PDF    | Hot-Sale-JN0-360-Exam    | 100%-Pass-JN0-360-Exams    | 100%-Pass-JN0-360-Real-Exam-Questions    | Dumps-JN0-360-exams-date    | Exam-Description-1Z0-876-dumps    | Latest-exam-1Z0-876-Dumps    | Dumps-HPE0-Y53-exams-date    | 2017-Latest-HPE0-Y53-Exam    | 100%-Pass-HPE0-Y53-Real-Exam-Questions    | Pass-4A0-100-Exam    | Latest-4A0-100-Questions    | Dumps-98-365-exams-date    | 2017-Latest-98-365-Exam    | 100%-Pass-VCS-254-Exams    | 2017-Latest-VCS-273-Exam    | Dumps-200-355-exams-date    | 2017-Latest-300-320-Exam    | Pass-300-101-Exam    | 100%-Pass-300-115-Exams    |
http://www.portvapes.co.uk/    | http://www.portvapes.co.uk/    |