Security+ Objectives 1.1

Brittany Morris
2 min readDec 31, 2020

--

Given a scenario, analyze indicators of compromise and determine the type of malware

  • Viruses — Malicious code that attaches itself to a host application. The host application must be executed to run, and the malicious code executes when the host application is executed.
  • Crypto-malware — A type of ransomware that encrypts the user’s data
  • Ransomware — A type of malware used to extort money from individuals and organizations. Ransomware typically encrypts the user’s data and demands a random before decrypting the data.
  • Worm — Self-replicating malware that travels through a network. Worms do not need user interaction to execute.
  • Trojan — Malware also known as a Trojan Horse. A trojan often looks useful, but is malicious
  • Rootkit — A type of malware that has system-level access to a computer. Rootkits are often able to hide themselves from users and antivirus software.
  • Keylogger — Software or hardware used to capture a user’s keystrokes. Keystrokes are stored in a file and can be manually retrieved or automatically sent to an attacker.
  • Adware — Advertising supported software. Displays unwanted advertisement on your computer. Malicious attack presented as an advertisement.
  • Spyware — Software installed on a users’ systems without their awareness or consent. Its purpose is often to monitor the user’s computer and the user’s activity.
  • Bots — Software robots function automatically.
  • Botnet — a group of computer that are joined together. Attackers often use malware to join computer to a botnet, and then use the botnet to launch attacks.
  • RAT — Remote access Trojan. Malware that allows an attacker to take control of a system from a remote location.
  • Logic Bomb — A type of malware that executes in response to an event. The event might be a specific date or time, or a user action such as when a user launches a specific program.
  • Backdoor — An alternate method of accessing a system. Malware often adds a backdoor into a system after it injects it.

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

--

--

No responses yet

Write a response