Threats and vulnerabilities

Area 2: Security, Confidentiality, and Privacy (35-45%)

Your Progress

0 of 97 questions attempted

Topics

  • Malware, phishing, and social engineering
  • Network-based attacks
  • Vulnerability assessment and management

Lessons

Study Frameworks

Malware Types and Characteristics

TypeBehaviorPropagationKey Characteristic
VirusAttaches to legitimate programsRequires user action (execute infected file)Cannot self-replicate without host program
WormSelf-replicating standalone programSpreads automatically across networksNo host program needed; consumes bandwidth
TrojanDisguised as legitimate softwareRequires user to installCreates backdoors; no self-replication
RansomwareEncrypts victim's filesPhishing, exploit kits, RDPDemands payment for decryption key
SpywareMonitors user activity secretlyBundled with software, drive-by downloadKeyloggers, screen capture, credential theft
RootkitHides deep in OS to maintain accessExploits or bundled with other malwareExtremely difficult to detect; modifies OS kernel
Practice These Topics(97 questions)