Want to create interactive content? It’s easy in Genially!

Get started free

MSIA685 Interactive Glossary

Erin Harkness

Created on January 12, 2024

Start designing with a free template

Discover more than 1500 professional designs like these:

Create Your Story in Spanish

Microcourse: Key Skills for University

Microcourse: Learn Spanish

History Timeline

Education Timeline

Body Parts Game

Resource Bank

Transcript

INTERACTIVE GLOSSARY

Intro and Basic Analysis

Snapshot

Information-stealing malware

Static analysis

Linking

Host-based signature

File signatures

Network-based signature

Static Linking

Launcher

Dynamic Linking

Heuristics

Rootkit

Malware

Host-only networking

Obfuscated

Scareware

Backdoor

Virtual Machine Team

Spam-sending malware

Packed

Botnet

Bridged network adapter

Imports

Worm or virus

Downloader

Packed

A subset of obfuscated programs whose code is compressed and cannot be analyzed.

Launcher

Malicious program used to launch other malicious programs.

Spam-sending malware

Malware that infects a user's machine and then uses that machine to send spam.

Rootkit

Malicious code designed to conceal the existence of other code.

Imports

Functions used by one program that are actually stored in a different program.

Linking

Process of connecting code libraries to the main executable.

Dynamic Linking

When the host operating system searches for the necessary libraries when the program is loaded. The linked code runs from within the library containing the code.

Snapshot

A virtualization concept that allows one to save a computer's current state and return to that point at a later time.

Bridged network adapter

The most common way to connect a virtual machine to the Internet. Allows a virtual machine to be connected to the same network interface as the physical machine.

Static Linking

When all code from libraries is copied into the executable's own code.

Botnet

Similar to a backdoor, in that it allows the attacker access to the system, but all computers infected with the same botnet receive the same instructions from a single command-and-control server.

Scareware

Malware designed to frighten an infected user into buying something.

Virtual Machine Team

A virtualization feature that allows you to manage the power and network settings of two or more virtual machines together.

File signatures

The term used to describe a technique to identify malware by identifying known suspicious code contained within the malware.

Downloader

Malicious code that exists only to download other malicious code.

Heuristics

The term used to describe a technique to identify malware by identifying behaviors and patterns that make a program malicious.

Backdoor

Malicious code that installs itself onto a computer to allow the attacker access.

Network-based signature

Indicators used to detect malicious code by monitoring network traffic.

Worm or virus

Malicious code that can copy itself and infect additional computers.

Obfuscated

Programs whose execution has been hidden by the malware author.

Static analysis

The process of analyzing the code or structure of a program to determine its function. The malicious code is not run.

Host-only networking

A virtualization feature that creates a separate private LAN between the host OS and the guest OS, commonly used in malware analysis.

Host-based signature

Indicators used to detect malicious code on victim computers

Information-stealing malware

Indicators used to detect malicious code on victim computers

Malware

Any software that does something that causes detriment to the user, computer, or network - such as viruses, trojan horses, worms, rootkits, scareware, and spyware.