Show Menu
Cheatography

Awareness Module 3 Cheat Sheet (DRAFT) by

This cheat sheet summarizes the key concepts from Module 3 to help with quiz preparation.

This is a draft cheat sheet. It is a work in progress and is not finished yet.

Malware

Malware is intrusive software designed by cyberc­rim­inals to steal data or harm systems (Cisco).

Types of malware

Adware
Displays unwanted advert­ise­ments on your screen.
Spyware
Observes your computer activity and reports it to the attacker.
Viruses
Infects files or system areas and spreads by self-r­epl­icating
Worms
Spreads by self-r­epl­icating without user action.
Trojans
Masque­rades as legitimate software while executing malicious actions.
Ransomware
Encrypts systems and data, demanding ransom for decryption
Rootkit
Gains admin access and is difficult to remove.
Keyloggers
Programs that log keystr­okes.
Malicious crypto miners
Uses your computer to mine crypto­cur­rency for attackers

Malware Detection & Prevention

First Step if Infected:
Disconnect from the network immedi­ately.
Detect­ion­/Re­moval Tools
Anti-m­alware, endpoint security, network monito­ring, Antivirus software (updated regula­rly).
Prevention Tips
- Keep OS/apps patched and updated.
- Verify email senders before opening attach­ments.
- Avoid suspicious downloads and links.
- Disable macros in Office documents (unless needed).
- Use antivirus, firewalls, and email filters.
- Beware of social engine­ering attempts.

How Malware Spreads

1) Opening a malicious email attach­ment.
2) Visiting unsafe websites.
3) Downlo­ading files from untrusted sources.
4) Clicking malicious links in messages (e.g., WhatsApp, Facebook).
5) Using unknown USBs, SD cards, or CDs
Key Reminder : Never use USB memory sticks that you may have found in common areas. They may have been planted there intent­ionally for you to find with the hope you would insert them into your computer

Zero-day Attacks

A zero-day attack exploits an unknown hardware, firmware, or software vulner­ability with no available immediate fix.
Life Cycle: Vulner­ability found → exploit created → attack occurs → vendor discovers → patch released.
Key Note: Users usually cannot stop zero-day attacks directly. Only way to prevent it is wareness + safe practices (patching, avoiding phishing, careful downloads) reduce risk.
 

Viruses

According to CISA, a virus infects files or system areas and self-r­epl­icates

Virus Symptoms

Slow perfor­mance
Corrupted or missing files
Pop-up and adware
Program and operating crash
Spinning hard drive
System malfun­ctions
Effects: Stolen personal inform­ation i.e. Identity theft & Lost account access

Ransomware

Malware that encrypts files, making them and related systems unusable.

Ransomware encrypts files, demanding payment for decryp­tion. It’s a major threat to all indust­ries, often spread through phishing emails with malicious attach­ments.

Denial­-of­-Se­rvice (Dos) Attacks

A Denial­-of­-Se­rvice (DoS) attack disrupts systems, devices, or networks by overwh­elming them with traffic, preventing legitimate access. This can halt business operat­ions, affect services like email, websites, and messaging, and result in financial loss. Attackers may be motivated by financial gain, hackti­vism, or system access attempts

Distri­buted DoS (DDos)

A Distri­buted Denial­-of­-Se­rvice (DDoS) attack occurs when multiple hijacked devices overwhelm a target system. Attackers exploit vulner­abi­lities to control these devices and direct them to flood the host with traffic

Advance persistent threat

An Advanced Persistent Threat (APT) is a long-term, stealthy attack on networks by nation­-st­ates, state-­spo­nsored groups, or organized crime, aiming for intell­igence, military, or financial gains.
Protection
1. Use Multi-­Factor Authen­tic­ation (MFA).
2. Never share creden­tials.
3. Report suspicious activity (e.g., mouse moving by itself, odd files appear­ing).
4. Cyber teams monitor for unusual patterns, but users are often first line of defense.

Signs of a DoS/DDoS Attack:

Slow network perfor­mance
Inacce­ssible websites
Inacce­ssible servers
Failed authen­tic­ation attempts

Avoiding DDoS/DoS Attacks

1) Use antivirus software on personal devices.
2) Enable a firewall for protec­tion.
3) Secure your devices vulner­abi­lities on hardware/ software