Course Hero Logo

Pre-Fi.docx - Part I 1. Select five (5) malware from the...

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 1 - 3 out of 6 pages.

Part I1.Select five (5) malware from thefollowing: Spyware, Adware, Rootkit, Ransomeware, Worm, Trojan Horse,or Backdoor2.Search two (2) examples for each of the five malware you haveselected. Add a short description for each. Cite your reference. (5 pointsper example)
2.Search two (2) examples for each of the five malware you have selected.Add a short description for each. Cite your reference. (5 points per example)-SPYWARE
b. Password stealers + Password stealers are very similar to infostealers, theonly difference being that they are specially designed to steal logincredentials from infected devices. First detected in 2012, these pieces ofspyware don’t steal your passwords as you type them. Instead, they attachthemselves to the browser to extract all your saved usernames andpasswords. In addition, they can also record your system login credentials.Most password stealers are routinely removed by reliable security software,but some types still manage to avoid detection by changing their file hashesbefore each attack. As with infostealers, the creators of password stealerscan choose whether they want to store the collected data on a remoteserver or in a hidden file on your hard drive.

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 6 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
N/A
Tags
Gator

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture