1 00:00:00,240 --> 00:00:02,250 A quick summary of malware. 2 00:00:02,250 --> 00:00:03,510 In this section of the course, 3 00:00:03,510 --> 00:00:06,290 we covered a lot of different types of malware. 4 00:00:06,290 --> 00:00:07,930 In this video, I wanted to give you 5 00:00:07,930 --> 00:00:09,990 just a quick one line summary 6 00:00:09,990 --> 00:00:12,790 of each type that you need to remember for the exam. 7 00:00:12,790 --> 00:00:15,040 If you remember nothing else from this section, 8 00:00:15,040 --> 00:00:18,370 this is the minimum information you have to know. 9 00:00:18,370 --> 00:00:19,870 First, viruses. 10 00:00:19,870 --> 00:00:22,140 Viruses are code that infect a computer 11 00:00:22,140 --> 00:00:24,600 when a file is opened or executed. 12 00:00:24,600 --> 00:00:25,880 When you think about a virus, 13 00:00:25,880 --> 00:00:28,120 remember, if it requires user action 14 00:00:28,120 --> 00:00:31,040 to be able to be opened, installed, or spread, 15 00:00:31,040 --> 00:00:32,900 it's likely a virus. 16 00:00:32,900 --> 00:00:33,770 Worm. 17 00:00:33,770 --> 00:00:35,750 A worm acts a lot like a virus 18 00:00:35,750 --> 00:00:38,890 but instead, it's able to do self-replication. 19 00:00:38,890 --> 00:00:43,090 It doesn't need any user action to be able to spread itself. 20 00:00:43,090 --> 00:00:44,140 A Trojan. 21 00:00:44,140 --> 00:00:45,370 A Trojan is a program 22 00:00:45,370 --> 00:00:47,920 that appears to do one desirable function 23 00:00:47,920 --> 00:00:50,260 but instead it does the desired function 24 00:00:50,260 --> 00:00:52,520 and malicious functions as well. 25 00:00:52,520 --> 00:00:54,740 Remember, the most common type nowadays 26 00:00:54,740 --> 00:00:56,170 is what's known as a RAT, 27 00:00:56,170 --> 00:00:57,883 a Remote Access Trojan. 28 00:00:58,871 --> 00:00:59,884 Ransomware. 29 00:00:59,884 --> 00:01:01,960 Ransomware is going to take control of your computer 30 00:01:01,960 --> 00:01:04,800 or your data unless you pay them some money. 31 00:01:04,800 --> 00:01:06,960 Again, they're holding it for ransom. 32 00:01:06,960 --> 00:01:09,850 They usually do this by encrypting your files. 33 00:01:09,850 --> 00:01:10,870 Spyware. 34 00:01:10,870 --> 00:01:13,340 Spyware is a software that collects your information 35 00:01:13,340 --> 00:01:14,710 without your consent. 36 00:01:14,710 --> 00:01:15,730 They're spying on you 37 00:01:15,730 --> 00:01:17,060 and then they're advertising to you 38 00:01:17,060 --> 00:01:19,470 or doing other things of that nature. 39 00:01:19,470 --> 00:01:20,550 A rootkit. 40 00:01:20,550 --> 00:01:21,730 A rootkit is going to gain 41 00:01:21,730 --> 00:01:24,260 administrative level control over your system 42 00:01:24,260 --> 00:01:25,780 by targeting the boot loader 43 00:01:25,780 --> 00:01:27,900 or the kernel of the operating system. 44 00:01:27,900 --> 00:01:29,730 And finally, spam. 45 00:01:29,730 --> 00:01:32,880 Spam is the abuse of electronic messaging systems, 46 00:01:32,880 --> 00:01:35,930 whether chat, email, or instant message. 47 00:01:35,930 --> 00:01:38,760 The most common of these though, is definitely email. 48 00:01:38,760 --> 00:01:42,660 Now, on exam day, you may see questions that ask you things 49 00:01:42,660 --> 00:01:45,480 like based on the description of a malicious file, 50 00:01:45,480 --> 00:01:47,110 what category does it fall into? 51 00:01:47,110 --> 00:01:48,820 Is it a virus, or is it a worm, 52 00:01:48,820 --> 00:01:50,240 or is it a Trojan? 53 00:01:50,240 --> 00:01:51,880 You may also be given definitions 54 00:01:51,880 --> 00:01:53,770 based on the 10 different types of viruses 55 00:01:53,770 --> 00:01:55,350 we talked about earlier. 56 00:01:55,350 --> 00:01:57,640 So if you remember the different types of viruses 57 00:01:57,640 --> 00:02:00,500 and the general categories that we covered in this lesson, 58 00:02:00,500 --> 00:02:03,583 you're going to do great on exam day.