🔐
CompTIA Security+
  • Introduction
  • Threats, Vulnerabilities, and Attacks
    • Threats
      • Threat Actors
      • Malware
    • Vulnerabilities
      • Vulnerability Research
      • Vulnerability Discovery
    • Attacks
      • Social Engineering
      • Password Guessing
      • Services & Applications
      • Wireless Communications
  • Technologies and Tools
    • Devices
      • Network Devices
      • Mobile Devices
    • Tools
    • Analysis
    • Troubleshooting
  • Architecture and Design
    • Frameworks & Guides
    • Cloud & Virtualization
    • Physical Security
    • Network Design
    • System Design
      • System Development
      • Application Security
      • Automation
    • Embedded Systems
  • Identity and Access Management
    • Concepts
    • Services
    • Controls
    • Procedures
  • Risk Management
    • Policy
    • Business Impact Analysis
    • Security Controls
    • Information Security
      • Data Security
      • Privacy
    • Contingency Planning
      • Incident Response
      • Disaster Recovery
      • Continuity of Operations
  • Cryptography and PKI
    • Concepts
    • Algorithms
    • Protocols
      • Authentication Protocols
      • Encryption Protocols
      • Network Service Protocols
    • Public Key Infrastructure
      • Concepts
      • Components
      • Certificates
Powered by GitBook
On this page
  • Viruses
  • Worms
  • Crypto-malware
  • Ransomware
  • Trojans
  • Rootkits
  • Keyloggers
  • Adware
  • Spyware
  • Bots
  • Logic bombs
  • Backdoors

Was this helpful?

  1. Threats, Vulnerabilities, and Attacks
  2. Threats

Malware

Analyze indicators of compromise and determine the type of malware.

PreviousThreat ActorsNextVulnerabilities

Last updated 4 years ago

Was this helpful?

Malware is software designed to destroy, alter, or disclose information and/or computers.

Viruses

Viruses are malware that require human-interaction to propagate.

Worms

Worms are malware that do NOT require human-interaction to propagate.

Crypto-malware

Crypto-malware encrypts data to make it unavailable.

Ransomware

Ransomware is a form of Crypto-Malware and requires payment for the keys that can recover data encrypted by the attacker.

Trojans

Trojans are malicious software hidden inside of benign software.

Remote Access Trojans (RATs) are trojans although they provide remote access once executed.

Rootkits

Rootkits are collections of tools designed to gain and/or maintain administrator access.

Keyloggers

Keyloggers, well, logs keystrokes. The point of them are to primarily learn user credentials, but can also be used to spy on people.

Adware

Adware can be described as enticing pop-ups loaded with malware. Examples are found on adult websites. If a website is promising you a good time, think twice.

Spyware

Spyware collects information about your computer activity. For example, logon times, files accessed, etc. might help an attacker learn more about you and/or your organization.

Bots

Computers under the control of an attacker.

Logic bombs

Logic Bombs are malware that executes when specific conditions are met. Said conditions may include date, time, or resource usage. Logic Bombs are often associated with insider threats.

Backdoors

Backdoors are entry points left behind by the attacker so she can maintain access in the future.