SlideShare a Scribd company logo
Table of Malware Attacks Updated July 3, 2024
SYMPTOM QUESTION OPTIONS FEEDBACK- CORRECT
ANSWER/S
FEEDBACK – INCORRECT ANSWER/S
Sluggish system
performance
and sudden
spikes in network
traffic.
What malware could
be causing these
problems?
Option 1
Cyberthreat
disguised as
legitimate software
to gain unauthorized
access or steal data.
Option 2 Self-
replicating digital
menace that infects
files and systems.
Option 3: Software
that secretly
monitors and
collects user
information.
Option 4: Malicious
software that
encrypts files and
demands payment
for decryption.
Option 5: Security
bug that spreads
autonomously across
networks and
consumes
bandwidth.
Answer: Trojans and Worms
Excellent! Both Trojans and
Worms can cause
sluggishness. Trojans
establish hidden
connections, while Worms
replicate and consume
resources.
Fight back with strong
passwords, smart
downloads, software
updates, and secure file
sharing.
Incorrect: Spyware
Mission Compromised! Spyware focuses on data
collection, not overwhelming network traffic.
Incorrect: Ransomware
Mission Compromised!
Ransomware and Viruses can slow systems but
wouldn't necessarily cause sudden traffic spikes.
Incorrect: Virus
Mission Compromised! Viruses can slow systems
due to file corruption; sudden network traffic
spikes are less likely.
Unidentified
programs
running in the
background
and unusual
background
What could be
causing these?
Option 1
Cyberthreat
disguised as
legitimate software
to gain unauthorized
access or steal data.
Answer: Spyware
Excellent! Spyware is like a
rogue agent in the
shadows, monitoring your
every keystroke and
Incorrect: Trojan
Mission Compromised! Not likely a Trojan. These
digital stowaways specialize in hidden backdoor
connections for data exfiltration, not
manipulating audio channels for creepy
background noise during calls.
noise during
calls.
Option 2 Self-
replicating digital
menace that infects
files and systems.
Option 3: Malicious
software that
encrypts files and
demands payment
for decryption.
Option 4: Security
bug that spreads
autonomously across
networks and
consumes
bandwidth.
Option 5: Software
that secretly
monitors and
collects user
information.
potentially bugging your
audio channels for intel.
Lock down your network
with a top-tier firewall and
anti-spyware suite to keep
your ops shrouded in
secrecy!
Incorrect: Ransomware
Mission Compromised! Ransomware is a data
hostage situation, not a listening bug.
Ransomware encrypts your files, demanding a
hefty ransom. Background noise during calls
wouldn't be part of their digital heist.
Incorrect: Virus
Mission Compromised! A viral outbreak is more of
a code corruption than covert listening. Viruses
inject malicious code, causing system issues, but
background noise during calls is a less likely
symptom.
Incorrect: Worms
Mission Compromised! While Worms replicate like
rogue AIs, they wouldn't directly tap into your
audio feed. Their mission is to consume resources
and spread across networks, not eavesdrop on
your calls.
Important files
locked and a
menacing timer
appears on
screen
demanding
payment to
unlock them.
What malware is
responsible for these
symptoms?
Option 1
Cyberthreat
disguised as
legitimate software
to gain unauthorized
access or steal data.
Option 2: Malicious
software that
encrypts files and
demands payment
for decryption.
Answer: Ransomware
Excellent! Ransomware is
like a digital kidnapper,
scrambling your files and
demanding a hefty ransom
for their return.
Retaliate with regular data
backups and a keen eye for
dodging suspicious links and
attachments – those are the
traps!
Incorrect: Trojans
Mission Compromised! Trojans are infiltrators that
bypass defenses, snatching your data like silent
thieves in the night: no alarms and ransoms, just a
clean getaway with your precious files.
Incorrect: Virus
Mission Compromised! Viruses are like malicious
code graffiti artists, injecting your system and
causing crashes and malfunctions. They aim to
disrupt, not hold your data hostage for ransom.
Option 3 Self-
replicating malware
that infects files and
systems.
Option 4: Security
bug that spreads
autonomously across
networks and
consumes
bandwidth.
Option 5: Software
that secretly
monitors and
collects user
information.
Incorrect: Worms
Mission Compromised! Worms replicate and
spread across your network, consuming resources
and causing chaos. More interested in disrupting
the system than holding your data hostage.
Incorrect: Spyware
Mission Compromised! Spyware are digital
eavesdroppers that lurk in the shadows,
collecting information like keystrokes and
browsing habits. Not pirates demanding ransom,
but spies stealing intel for their own nefarious
purposes.
Frequent
crashes,
unexpected
program
behavior, and
software
refusing to
launch.
What malicious
malware could be
causing these?
Option 1
Cyberthreat
disguised as
legitimate software
to gain unauthorized
access or steal data.
Option 2: Malicious
software that
encrypts files and
demands payment
for decryption.
Option 3 Self-
replicating digital
menace that infects
files and systems.
Option 4: Security
bug that spreads
autonomously across
networks and
consumes
bandwidth.
Answer: Virus
Excellent! Viruses sneak in,
corrupt files, crash
programs, and self-replicate
to spread chaos.
Keep defenses by
downloading software only
from trusted sources and
keeping your antivirus
software constantly
updated - like a digital
vaccine!
Incorrect:
Mission Compromised!
Trojans focus on specific programs, exploiting
backdoors to steal data. Widespread corruption
suggests a broader attack, not a single Trojan's
handiwork.
Incorrect: Ransomware
Mission Compromised! Ransomware encrypts
files, holding them hostage for a ransom. Look for
inaccessible files and ransom demands, not
widespread corruption.
Incorrect: Worms
Mission Compromised!
Worms replicate and spread, focusing on
resource consumption, not widespread file
corruption. Look for slowdowns and network
congestion, not corrupted files.
Option 5: Software
that secretly
monitors and
collects user
information.
Incorrect: Spyware
Mission Compromised! Spyware prioritizes stealing
information, not corrupting files. Extensive file
corruption points to a different culprit.
Rapid data
propagation
across the
network without
user intervention
and increased
network
bandwidth
consumption.
What threat might
be causing these?
Option 1
Cyberthreat
disguised as
legitimate software
to gain unauthorized
access or steal data.
Option 2: Malicious
software that
encrypts files and
demands payment
for decryption.
Option 3 Self-
replicating digital
menace malware
that infects files and
systems.
Option 4: Security
bug that spreads
autonomously across
networks and
consumes
bandwidth.
Option 5: Software
that secretly
monitors and
collects user
information.
Answer: Worms
Excellent! Worms are
bandwidth bandits- self-
replicating gremlins,
multiplying and spreading
across networks, sucking up
your precious bandwidth.
Patch network holes and
shut down unused services.
These digital stowaways
exploit vulnerabilities.
Incorrect: Trojan
Mission Compromised! Trojans steal data via
hidden connections, not a self-replicating
network plague like a worm.
Incorrect: Ransomware
Mission Compromised! Ransomware encrypts files
for ransom, not network takeover like a worm.
Incorrect: Virus
Mission Compromised! A virus spreads through
infected files but lacks the worm's network-
jumping ability.
Incorrect: Spyware
Mission Compromised! Spyware gathers intel
within your system, not launching a network-wide
infection.

More Related Content

PPT
Cyber-Security.ppt
PPT
Cyber-Security-20211013105857 (1).ppt
PPT
Direct infection: virus can infect files every time a user opens that specif...
PPT
Cyber-Security-power point presentation.
PPTX
Cyber security by vinod sencha for education
PPT
Cyber-Security]shhsjjsjsjdjdjjddjjdjh.ppt
PPT
Cyber-Security-20211013105857.ppt
PPT
Cyber-Security-20211013105857.ppt
Cyber-Security.ppt
Cyber-Security-20211013105857 (1).ppt
Direct infection: virus can infect files every time a user opens that specif...
Cyber-Security-power point presentation.
Cyber security by vinod sencha for education
Cyber-Security]shhsjjsjsjdjdjjddjjdjh.ppt
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt

Similar to table of Malware Attack an information security lesson.pdf (20)

PPT
Cyber-Security-20211013105857.ppt
PPT
Cyber-Security-20211013105857.ppt
PPT
Cyber-Security-20211013105857.ppt
PPT
Cyber-Security-20211013105857 (1).ppt
PPT
cybertestqas.ppt
PPT
Cyber-Security-20211013105857.ppt
PPT
Cyber-Security-20211013105857.ppt
PPT
Cyber-Security-20211013105857.ppt
PPT
cs0123.ppt
PPT
Cyber-Security-20211013105857.ppt
PPT
Cyber-Security-20211013105857.ppt
PPT
Cyber-Security-.ppt
PPT
Cyber-Security-20211013105857.ppt
PPTX
Cyber-Security.ppt
PPT
Cyber-Security-20211013105857.ppt HGJHHKJHJKHKH
PPT
Cyber-Security-20211013105857.ppt
PPT
Cyber-Security.ppt
PPT
Cyber-Security-20211013105857 (1).ppt
PPT
Cyber-Security-.ppt
PDF
Information security
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857 (1).ppt
cybertestqas.ppt
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
cs0123.ppt
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
Cyber-Security-.ppt
Cyber-Security-20211013105857.ppt
Cyber-Security.ppt
Cyber-Security-20211013105857.ppt HGJHHKJHJKHKH
Cyber-Security-20211013105857.ppt
Cyber-Security.ppt
Cyber-Security-20211013105857 (1).ppt
Cyber-Security-.ppt
Information security
Ad

Recently uploaded (20)

PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
RMMM.pdf make it easy to upload and study
PDF
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PPTX
Orientation - ARALprogram of Deped to the Parents.pptx
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Lesson notes of climatology university.
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PPTX
Digestion and Absorption of Carbohydrates, Proteina and Fats
PPTX
UNIT III MENTAL HEALTH NURSING ASSESSMENT
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PDF
1_English_Language_Set_2.pdf probationary
PDF
A systematic review of self-coping strategies used by university students to ...
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PDF
IGGE1 Understanding the Self1234567891011
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
RMMM.pdf make it easy to upload and study
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
Practical Manual AGRO-233 Principles and Practices of Natural Farming
Orientation - ARALprogram of Deped to the Parents.pptx
Final Presentation General Medicine 03-08-2024.pptx
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
Final Presentation General Medicine 03-08-2024.pptx
Lesson notes of climatology university.
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
Digestion and Absorption of Carbohydrates, Proteina and Fats
UNIT III MENTAL HEALTH NURSING ASSESSMENT
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
1_English_Language_Set_2.pdf probationary
A systematic review of self-coping strategies used by university students to ...
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
IGGE1 Understanding the Self1234567891011
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Ad

table of Malware Attack an information security lesson.pdf

  • 1. Table of Malware Attacks Updated July 3, 2024 SYMPTOM QUESTION OPTIONS FEEDBACK- CORRECT ANSWER/S FEEDBACK – INCORRECT ANSWER/S Sluggish system performance and sudden spikes in network traffic. What malware could be causing these problems? Option 1 Cyberthreat disguised as legitimate software to gain unauthorized access or steal data. Option 2 Self- replicating digital menace that infects files and systems. Option 3: Software that secretly monitors and collects user information. Option 4: Malicious software that encrypts files and demands payment for decryption. Option 5: Security bug that spreads autonomously across networks and consumes bandwidth. Answer: Trojans and Worms Excellent! Both Trojans and Worms can cause sluggishness. Trojans establish hidden connections, while Worms replicate and consume resources. Fight back with strong passwords, smart downloads, software updates, and secure file sharing. Incorrect: Spyware Mission Compromised! Spyware focuses on data collection, not overwhelming network traffic. Incorrect: Ransomware Mission Compromised! Ransomware and Viruses can slow systems but wouldn't necessarily cause sudden traffic spikes. Incorrect: Virus Mission Compromised! Viruses can slow systems due to file corruption; sudden network traffic spikes are less likely. Unidentified programs running in the background and unusual background What could be causing these? Option 1 Cyberthreat disguised as legitimate software to gain unauthorized access or steal data. Answer: Spyware Excellent! Spyware is like a rogue agent in the shadows, monitoring your every keystroke and Incorrect: Trojan Mission Compromised! Not likely a Trojan. These digital stowaways specialize in hidden backdoor connections for data exfiltration, not manipulating audio channels for creepy background noise during calls.
  • 2. noise during calls. Option 2 Self- replicating digital menace that infects files and systems. Option 3: Malicious software that encrypts files and demands payment for decryption. Option 4: Security bug that spreads autonomously across networks and consumes bandwidth. Option 5: Software that secretly monitors and collects user information. potentially bugging your audio channels for intel. Lock down your network with a top-tier firewall and anti-spyware suite to keep your ops shrouded in secrecy! Incorrect: Ransomware Mission Compromised! Ransomware is a data hostage situation, not a listening bug. Ransomware encrypts your files, demanding a hefty ransom. Background noise during calls wouldn't be part of their digital heist. Incorrect: Virus Mission Compromised! A viral outbreak is more of a code corruption than covert listening. Viruses inject malicious code, causing system issues, but background noise during calls is a less likely symptom. Incorrect: Worms Mission Compromised! While Worms replicate like rogue AIs, they wouldn't directly tap into your audio feed. Their mission is to consume resources and spread across networks, not eavesdrop on your calls. Important files locked and a menacing timer appears on screen demanding payment to unlock them. What malware is responsible for these symptoms? Option 1 Cyberthreat disguised as legitimate software to gain unauthorized access or steal data. Option 2: Malicious software that encrypts files and demands payment for decryption. Answer: Ransomware Excellent! Ransomware is like a digital kidnapper, scrambling your files and demanding a hefty ransom for their return. Retaliate with regular data backups and a keen eye for dodging suspicious links and attachments – those are the traps! Incorrect: Trojans Mission Compromised! Trojans are infiltrators that bypass defenses, snatching your data like silent thieves in the night: no alarms and ransoms, just a clean getaway with your precious files. Incorrect: Virus Mission Compromised! Viruses are like malicious code graffiti artists, injecting your system and causing crashes and malfunctions. They aim to disrupt, not hold your data hostage for ransom.
  • 3. Option 3 Self- replicating malware that infects files and systems. Option 4: Security bug that spreads autonomously across networks and consumes bandwidth. Option 5: Software that secretly monitors and collects user information. Incorrect: Worms Mission Compromised! Worms replicate and spread across your network, consuming resources and causing chaos. More interested in disrupting the system than holding your data hostage. Incorrect: Spyware Mission Compromised! Spyware are digital eavesdroppers that lurk in the shadows, collecting information like keystrokes and browsing habits. Not pirates demanding ransom, but spies stealing intel for their own nefarious purposes. Frequent crashes, unexpected program behavior, and software refusing to launch. What malicious malware could be causing these? Option 1 Cyberthreat disguised as legitimate software to gain unauthorized access or steal data. Option 2: Malicious software that encrypts files and demands payment for decryption. Option 3 Self- replicating digital menace that infects files and systems. Option 4: Security bug that spreads autonomously across networks and consumes bandwidth. Answer: Virus Excellent! Viruses sneak in, corrupt files, crash programs, and self-replicate to spread chaos. Keep defenses by downloading software only from trusted sources and keeping your antivirus software constantly updated - like a digital vaccine! Incorrect: Mission Compromised! Trojans focus on specific programs, exploiting backdoors to steal data. Widespread corruption suggests a broader attack, not a single Trojan's handiwork. Incorrect: Ransomware Mission Compromised! Ransomware encrypts files, holding them hostage for a ransom. Look for inaccessible files and ransom demands, not widespread corruption. Incorrect: Worms Mission Compromised! Worms replicate and spread, focusing on resource consumption, not widespread file corruption. Look for slowdowns and network congestion, not corrupted files.
  • 4. Option 5: Software that secretly monitors and collects user information. Incorrect: Spyware Mission Compromised! Spyware prioritizes stealing information, not corrupting files. Extensive file corruption points to a different culprit. Rapid data propagation across the network without user intervention and increased network bandwidth consumption. What threat might be causing these? Option 1 Cyberthreat disguised as legitimate software to gain unauthorized access or steal data. Option 2: Malicious software that encrypts files and demands payment for decryption. Option 3 Self- replicating digital menace malware that infects files and systems. Option 4: Security bug that spreads autonomously across networks and consumes bandwidth. Option 5: Software that secretly monitors and collects user information. Answer: Worms Excellent! Worms are bandwidth bandits- self- replicating gremlins, multiplying and spreading across networks, sucking up your precious bandwidth. Patch network holes and shut down unused services. These digital stowaways exploit vulnerabilities. Incorrect: Trojan Mission Compromised! Trojans steal data via hidden connections, not a self-replicating network plague like a worm. Incorrect: Ransomware Mission Compromised! Ransomware encrypts files for ransom, not network takeover like a worm. Incorrect: Virus Mission Compromised! A virus spreads through infected files but lacks the worm's network- jumping ability. Incorrect: Spyware Mission Compromised! Spyware gathers intel within your system, not launching a network-wide infection.