Malware, Data Protection, Cryptographic
Solutions, Risk Management, Third Party
risks and Governance and Compliance.
Malware [Section 6] ANS: Any software that is designed to infiltrate a computer system without the
user's knowledge.
Threat Vector [Section 6] ANS: Specific methods used by an attacker to infiltrate a victim's system.
(Unpatched software, code, phishing and more).
Attack Vector [Section 6] ANS: A means by which an attacker gains access to a computer to infect the
system with malware.
Virus [Section 6] ANS: Malicious software that attaches to clean files and spreads into a computer
system.
Worms [Section 6] ANS: Standalone malware programs that replicate and spread to other systems by
exploiting software vulnerabilities.
Trojans [Section 6] ANS: Malicious programs which appear to be legitimate software that allows
unauthorised access to a victim's system when executed.
Ransomware [Section 6] ANS: Encrypts a user's data and holds it, hostage, until a ransom is paid to the
attacker for decryption.
Zombies (Botnets) [Section 6] ANS: Compromised computers that are remotely controlled by attackers
and used in coordination to form a botnet.
,Botnet (Botnets) [Section 6] ANS: Network of zombies and are often used for DDoS attacks, spam
distribution, or cryptocurrency mining.
Rootkits [Section 6] ANS: Malicious tools that hide their activities and operate at the OS level to allow
for ongoing privileged access.
Backdoors [Section 6] ANS: Malicious means of bypassing normal authentication processes to gain
unauthorised access to a system.
Logic Bombs [Section 6] ANS: Embedded code placed in legitimate programs that executes a malicious
action when a specific condition or trigger occurs.
Keyloggers [Section 6] ANS: Record a user's keystrokes and are ued to capture passwords or other
sensitive information.
Spyware [Section 6] ANS: Secretly monitors and gathers user information or activities and sends data to
third parties.
Bloatware [Section 6] ANS: Unnecessary or pre-installed software that consumes system resources and
space without offering any value to the user.
Malware Exploitation Techniques [Section 6] ANS: Involve methods by which malware infiltrates and
infects targeted systems.
Boot Sector Virus [Section 6] ANS: Stored in the first sector of a HD and is then loaded into memory
whenever the computer boots.
Macro Virus [Section 6] ANS: A form of code that allows a virus to be embedded inside another
document so that when the document is opened by the user, the virus is executed.
, Program Virus [Section 6] ANS: Tries to find executables or application files to infect with their malicious
code.
Multipartite Virus [Section 6] ANS: A combination of a boto sector type virus and a program virus.
Encrypted Virus [Section 6] ANS: Designed to hide itself from being detected by encrypting its malicious
code or payloads to avoid detection by any antivirus software.
Polymorphic virus [Section 6] ANS: Advanced version of an encrypted virus, but instead of just
encrypting the contents, it will actually change the virus's code each time it is executed by altering the
decryption module in order for it to evade detection.
Metamorphic Virus [Section 6] ANS: Able to rewrite itself entirely before it attempts to infect a given
file.
Stealth Virus [Section 6] ANS: Not necessarily a virus as much as it is a technique used to prevent the
virus from being detected.
Armored Virus [Section 6] ANS: Have a layer of protection to confuse a program or a person who's
trying to analyse it.
Hoax Virus [Section 6] ANS: A form of technical social engineering that attempts to scare end users into
taking an undesirable action on their system.
Remote Access Trojan (RAT) [Section 6] ANS: Type of Trojan that is widely used by modern attackers
because it provides the attacker with remote control of a victim machine.