INTERACTIVE GLOSSARY
Intro and Basic Analysis
Snapshot
Information-stealing malware
Static analysis
Linking
Host-based signature
File signatures
Network-based signature
Static Linking
Launcher
Dynamic Linking
Heuristics
Rootkit
Malware
Host-only networking
Obfuscated
Scareware
Backdoor
Virtual Machine Team
Spam-sending malware
Packed
Botnet
Bridged network adapter
Imports
Worm or virus
Downloader
Packed
A subset of obfuscated programs whose code is compressed and cannot be analyzed.
Launcher
Malicious program used to launch other malicious programs.
Spam-sending malware
Malware that infects a user's machine and then uses that machine to send spam.
Rootkit
Malicious code designed to conceal the existence of other code.
Imports
Functions used by one program that are actually stored in a different program.
Linking
Process of connecting code libraries to the main executable.
Dynamic Linking
When the host operating system searches for the necessary libraries when the program is loaded. The linked code runs from within the library containing the code.
Snapshot
A virtualization concept that allows one to save a computer's current state and return to that point at a later time.
Bridged network adapter
The most common way to connect a virtual machine to the Internet. Allows a virtual machine to be connected to the same network interface as the physical machine.
Static Linking
When all code from libraries is copied into the executable's own code.
Botnet
Similar to a backdoor, in that it allows the attacker access to the system, but all computers infected with the same botnet receive the same instructions from a single command-and-control server.
Scareware
Malware designed to frighten an infected user into buying something.
Virtual Machine Team
A virtualization feature that allows you to manage the power and network settings of two or more virtual machines together.
File signatures
The term used to describe a technique to identify malware by identifying known suspicious code contained within the malware.
Downloader
Malicious code that exists only to download other malicious code.
Heuristics
The term used to describe a technique to identify malware by identifying behaviors and patterns that make a program malicious.
Backdoor
Malicious code that installs itself onto a computer to allow the attacker access.
Network-based signature
Indicators used to detect malicious code by monitoring network traffic.
Worm or virus
Malicious code that can copy itself and infect additional computers.
Obfuscated
Programs whose execution has been hidden by the malware author.
Static analysis
The process of analyzing the code or structure of a program to determine its function. The malicious code is not run.
Host-only networking
A virtualization feature that creates a separate private LAN between the host OS and the guest OS, commonly used in malware analysis.
Host-based signature
Indicators used to detect malicious code on victim computers
Information-stealing malware
Indicators used to detect malicious code on victim computers
Malware
Any software that does something that causes detriment to the user, computer, or network - such as viruses, trojan horses, worms, rootkits, scareware, and spyware.
MSIA685 Interactive Glossary
Erin Harkness
Created on January 12, 2024
Start designing with a free template
Discover more than 1500 professional designs like these:
View
Create Your Story in Spanish
View
Microcourse: Key Skills for University
View
Microcourse: Learn Spanish
View
History Timeline
View
Education Timeline
View
Body Parts Game
View
Resource Bank
Explore all templates
Transcript
INTERACTIVE GLOSSARY
Intro and Basic Analysis
Snapshot
Information-stealing malware
Static analysis
Linking
Host-based signature
File signatures
Network-based signature
Static Linking
Launcher
Dynamic Linking
Heuristics
Rootkit
Malware
Host-only networking
Obfuscated
Scareware
Backdoor
Virtual Machine Team
Spam-sending malware
Packed
Botnet
Bridged network adapter
Imports
Worm or virus
Downloader
Packed
A subset of obfuscated programs whose code is compressed and cannot be analyzed.
Launcher
Malicious program used to launch other malicious programs.
Spam-sending malware
Malware that infects a user's machine and then uses that machine to send spam.
Rootkit
Malicious code designed to conceal the existence of other code.
Imports
Functions used by one program that are actually stored in a different program.
Linking
Process of connecting code libraries to the main executable.
Dynamic Linking
When the host operating system searches for the necessary libraries when the program is loaded. The linked code runs from within the library containing the code.
Snapshot
A virtualization concept that allows one to save a computer's current state and return to that point at a later time.
Bridged network adapter
The most common way to connect a virtual machine to the Internet. Allows a virtual machine to be connected to the same network interface as the physical machine.
Static Linking
When all code from libraries is copied into the executable's own code.
Botnet
Similar to a backdoor, in that it allows the attacker access to the system, but all computers infected with the same botnet receive the same instructions from a single command-and-control server.
Scareware
Malware designed to frighten an infected user into buying something.
Virtual Machine Team
A virtualization feature that allows you to manage the power and network settings of two or more virtual machines together.
File signatures
The term used to describe a technique to identify malware by identifying known suspicious code contained within the malware.
Downloader
Malicious code that exists only to download other malicious code.
Heuristics
The term used to describe a technique to identify malware by identifying behaviors and patterns that make a program malicious.
Backdoor
Malicious code that installs itself onto a computer to allow the attacker access.
Network-based signature
Indicators used to detect malicious code by monitoring network traffic.
Worm or virus
Malicious code that can copy itself and infect additional computers.
Obfuscated
Programs whose execution has been hidden by the malware author.
Static analysis
The process of analyzing the code or structure of a program to determine its function. The malicious code is not run.
Host-only networking
A virtualization feature that creates a separate private LAN between the host OS and the guest OS, commonly used in malware analysis.
Host-based signature
Indicators used to detect malicious code on victim computers
Information-stealing malware
Indicators used to detect malicious code on victim computers
Malware
Any software that does something that causes detriment to the user, computer, or network - such as viruses, trojan horses, worms, rootkits, scareware, and spyware.