Study smarter with Fiveable
Get study guides, practice questions, and cheatsheets for all your subjects. Join 500,000+ students with a 96% pass rate.
Malware isn't just a single threat—it's an entire ecosystem of attack methods, each exploiting different vulnerabilities in systems, networks, and human behavior. You're being tested on your ability to distinguish between malware types based on their propagation methods, persistence mechanisms, and attack objectives. Understanding these distinctions is essential for identifying appropriate countermeasures and analyzing real-world security incidents.
The concepts here connect directly to broader cybersecurity principles: defense in depth, the CIA triad (confidentiality, integrity, availability), and the human factor in security. Don't just memorize what each malware type does—know why it works, how it spreads, and what defensive strategies counter it. That's what separates surface-level recall from exam-ready understanding.
These threats spread autonomously, multiplying across systems and networks. The key distinction here is whether they require a host file or user action to propagate.
Compare: Viruses vs. Worms—both self-replicate, but viruses need a host file and user action while worms spread autonomously through network vulnerabilities. If an exam question asks about malware causing network congestion without user involvement, think worms.
These threats rely on social engineering rather than technical exploits. They trick users into installing them by appearing legitimate or desirable.
Compare: Trojans vs. Adware—both often arrive through deceptive downloads, but Trojans focus on unauthorized access while adware prioritizes advertising revenue. Trojans are always malicious; adware exists in a gray area between annoying and harmful.
These threats prioritize confidentiality attacks, secretly gathering sensitive information without the user's knowledge or consent.
Compare: Spyware vs. Keyloggers—keyloggers are technically a subset of spyware, but the distinction matters. Spyware broadly monitors activity and collects data; keyloggers specifically capture typed input. Both attack confidentiality, but keyloggers are more targeted and dangerous for credential theft.
These threats focus on availability attacks, either denying access to data or systems until demands are met.
Compare: Ransomware vs. Botnets—both can cause denial-of-service conditions, but through different mechanisms. Ransomware denies access to your own data through encryption; botnets deny access to services by overwhelming them with traffic. Ransomware targets individual victims; botnets weaponize victims to attack others.
These threats prioritize evasion and long-term access, hiding from detection while maintaining attacker control over compromised systems.
Compare: Rootkits vs. Fileless Malware—both prioritize evasion, but through different methods. Rootkits modify system components to hide files on disk; fileless malware avoids the disk entirely. Rootkits are about concealment; fileless malware is about leaving no evidence to conceal.
| Concept | Best Examples |
|---|---|
| Self-propagation (requires host) | Virus |
| Self-propagation (standalone) | Worm, Botnet |
| Social engineering delivery | Trojan, Adware |
| Confidentiality attacks | Spyware, Keylogger |
| Availability/extortion attacks | Ransomware, Botnet (DDoS) |
| Stealth and evasion | Rootkit, Fileless Malware |
| Persistence mechanisms | Rootkit, Trojan (backdoor) |
| Requires user action | Virus, Trojan, Adware |
Compare and contrast: What distinguishes a virus from a worm in terms of propagation requirements, and how does this difference affect their potential spread rate?
A security analyst discovers malware that captured login credentials by recording everything typed on an infected workstation. Which two malware types could be responsible, and how would you distinguish between them?
An organization's files are suddenly inaccessible, and a message demands Bitcoin payment. What type of malware is this, and why are backups—rather than payment—the recommended response?
Which malware types specifically prioritize evasion as their primary characteristic, and what detection methods are required for each?
FRQ-style prompt: Explain how a botnet attack differs from a ransomware attack in terms of the CIA triad element primarily targeted and the relationship between the attacker and the victim's system.