Show Menu
Cheatography

Awareness Module 3 Cheat Sheet (DRAFT) by

This cheat sheet summarizes the key concepts from Module 3 to help with quiz preparation.

This is a draft cheat sheet. It is a work in progress and is not finished yet.

Malware

Malware is intrusive software designed by cyberc­rim­inals to steal data or harm systems (Cisco).

Types of malware

Adware
Displays unwanted advert­ise­ments on your screen.
Spyware
Observes your computer activity and reports it to the attacker.
Viruses
Infects files or system areas and spreads by self-r­epl­icating
Worms
Spreads by self-r­epl­icating without user action.
Trojans
Masque­rades as legitimate software while executing malicious actions.
Ransomware
Encrypts systems and data, demanding ransom for decryption
Rootkit
Gains admin access and is difficult to remove.
Keyloggers
Programs that log keystr­okes.
Malicious crypto miners
Uses your computer to mine crypto­cur­rency for attackers

How to get Malware

1) Opening a malicious email attach­ment.
2) Visiting unsafe websites.
3) Downlo­ading files from untrusted sources.
4) Clicking malicious links in messages (e.g., WhatsApp, Facebook).
5) Using unknown USBs, SD cards, or CDs
Never use USB memory sticks that you may have found in common areas. They may have been planted there intent­ionally for you to find with the hope you would insert them into your computer

Zero-day Attacks

A zero-day attack exploits an unknown hardware, firmware, or software vulner­ability with no available immediate fix

Advance persistent threat

An Advanced Persistent Threat (APT) is a long-term, stealthy attack on networks by nation­-st­ates, state-­spo­nsored groups, or organized crime, aiming for intell­igence, military, or financial gains.
 

Viruses

According to CISA, a virus infects files or system areas and self-r­epl­icates

Virus Symptoms

Slow perfor­mance
Corrupted or missing files
Pop-up and adware
Program and operating crash
spinning hard drive
System malfun­ctions
Effects:
Stolen personal inform­ation & Lost account access

Ransomware

Malware that encrypts files, making them and related systems unusable.

Ransomware encrypts files, demanding payment for decryp­tion. It’s a major threat to all indust­ries, often spread through phishing emails with malicious attach­ments.

Denial­-of­-Se­rvice (Dos) Attacks

A Denial­-of­-Se­rvice (DoS) attack disrupts systems, devices, or networks by overwh­elming them with traffic, preventing legitimate access. This can halt business operat­ions, affect services like email, websites, and messaging, and result in financial loss. Attackers may be motivated by financial gain, hackti­vism, or system access attempts

Distri­buted DoS (DDos)

A Distri­buted Denial­-of­-Se­rvice (DDoS) attack occurs when multiple hijacked devices overwhelm a target system. Attackers exploit vulner­abi­lities to control these devices and direct them to flood the host with traffic

Signs of a DoS/DDoS Attack:

Slow network perfor­mance
Inacce­ssible websites
Inacce­ssible servers
Failed authen­tic­ation attempts

Avoiding DDoS/DoS Attacks

1) Use antivirus software on personal devices.
2) Enable a firewall for protec­tion.
3) Secure your devices vulner­abi­lities on hardware/ software