TEXT 1
What
is malware?
Malware, or malicious
software, is any program or file that is intentionally harmful to a computer,
network or server.
Types of malware include
computer viruses, worms, Trojan horses, ransomware and spyware. These malicious
programs steal, encrypt and delete sensitive data; alter or hijack core
computing functions and monitor end users' computer activity.
Malware can infect
networks and devices and is designed to harm those devices, networks and/or
their users in some way.
Depending on the type of
malware and its goal, this harm may present itself differently to the user or
endpoint. In some cases, the effect malware has is relatively mild and benign,
and in others, it can be disastrous.
No matter the method, all
types of malware are designed to exploit devices at the expense of the user and
to the benefit of the hacker -- the person who has designed and/or deployed the
malware.
Ex.1 Answer the questions
1.
What is malware?
2.
Name the types of malware
3.
What is the purpose of
malware?
4.
What are all types of malware
designed to do?
Ex.2 Find English equivalents to the Russian word combinations.
Намеренно, программы-вымогатели, конфиденциальные данные,
захватывать, основные вычислительные функции, относительно мягкий,
катастрофический, предназначены для эксплуатации устройств за счет пользователя
Ex.3 Fill in the gaps with the
words from the box
malware,
to exploit devices, viruses, Trojan horses, worms, ransomware, spyware,
infect, disastrous
|
1.
According to experts, _______ is becoming increasingly
sophisticated and dangerous, making it more likely to _____ users' devices.
2.
________ is a type of
malware that exploits vulnerabilities in computers to infect the system and
then demand a ransom.
3.
The company was attacked by
_______and ________, leading to disastrous consequences for their
infrastructure.
4.
Computer _____ and warms can
infect a network, spreading from device to device without the need for the user
to manually open an infected file.
5.
To prevent ________ from
tracking you online, it is important to install antivirus and antispyware
software.
6.
After a malware attack, the
company faced ________consequences, including the leakage of confidential data
and financial losses.
7.
Cybercriminals are constantly
searching for new ways __________ and create new viruses to target computers.
Ex.4 Look through text 2 and find
English equivalents to the following sentences.
1.
Вредоносные программы могут
быть доставлены в систему с помощью USB-накопителя, с помощью популярных
инструментов совместной работы и путем загрузки с диска.
2.
Сложные вредоносные атаки
часто предполагают использование командно-контрольного сервера, который
позволяет злоумышленникам взаимодействовать с зараженными системами, извлекать
конфиденциальные данные и даже удаленно управлять скомпрометированным
устройством или сервером.
3.
Некоторые из этих методов
уклонения основаны на простой тактике, такой как использование веб-прокси для
сокрытия вредоносного трафика или исходных IP-адресов.
4.
Полиморфное вредоносное ПО
может многократно изменять свой базовый код, чтобы избежать обнаружения
средствами обнаружения на основе сигнатур.
5.
Методы защиты от изолированной
среды позволяют вредоносному ПО обнаруживать, когда оно анализируется, и
откладывать выполнение до тех пор, пока оно не покинет изолированную среду.
6.
Вредоносное ПО без файлов
находится только в оперативной памяти системы, чтобы избежать обнаружения.
TEXT 2
How do
malware infections happen?
Malware authors use a
variety of physical and virtual means to spread malware that infects devices
and networks. For example, malicious programs can be delivered to a system with
a USB drive, through popular collaboration tools and by drive-by downloads,
which automatically download malicious programs to systems without the user's
approval or knowledge.
Phishing attacks are
another common type of malware delivery where emails disguised as legitimate
messages contain malicious links or attachments that deliver the malware
executable file to unsuspecting users. Sophisticated malware attacks often
feature the use of a command-and-control server that enables threat actors to
communicate with the infected systems, exfiltrate sensitive data and even
remotely control the compromised device or server.
Emerging strains of
malware include new evasion and obfuscation techniques designed to not only
fool users, but also security administrators and antimalware products. Some of
these evasion techniques rely on simple tactics, such as using web proxies to hide
malicious traffic or source IP addresses. More sophisticated threats include
polymorphic malware that can repeatedly change its underlying code to avoid
detection from signature-based detection tools; anti-sandbox techniques that
enable malware to detect when it is being analyzed and to delay execution until
after it leaves the sandbox; and fileless malware that resides only in the
system's RAM to avoid being discovered.
Ex.5 Find English equivalents to the Russian word combinations.
Авторы вредоносных
программ; физические и виртуальные средства; устройства и сети; без одобрения
или ведома пользователя; фишинговые атаки; доставка вредоносных программ; электронные
письма, замаскированные под законные сообщения; исполняемый файл
вредоносного ПО; сложные вредоносные атаки; командно-контрольный сервер;
злоумышленники; извлекать конфиденциальные данные; новые методы уклонения и
обфускации(запутывание кода); одурачить пользователей; полиморфное вредоносное ПО; свой базовый
код; средства обнаружения на основе сигнатур.
Ex.6 Answer the questions to text 2
1.
Why do malware authors use different ways to spread malware?
2.
What are the ways of delivering malware to a system?
3.
What helps threat actors
to communicate with the infected systems, exfiltrate sensitive data and even
remotely control the compromised device or server?
4.
What techniques are designed to
fool users, security administrators and antimalware products?
5.
What do some of these evasion
techniques rely on?
6.
What do more sophisticated
threats include?
Ex.7 Match the beginning and the end of the statements
1.
Anti-sandbox techniques enable malware
to detect
|
a.
such as using web proxies to hide
malicious traffic or source IP addresses.
|
2.
Phishing attacks are another common type
of malware delivery
|
b.
malicious programs to systems without
the user's approval or knowledge.
|
3.
Sophisticated malware attacks often
feature the use of a command-and-control server
|
c.
malware that infects devices and
networks.
|
4.
Popular collaboration tools and by
drive-by downloads automatically download
|
d.
that enables threat actors to
communicate with the infected systems, exfiltrate sensitive data and even
remotely control the compromised device or server.
|
5.
Malware authors use a variety of
physical and virtual means to spread
|
e.
new evasion and obfuscation techniques.
|
6.
Emerging strains of malware include
|
f.
where emails disguised as legitimate
messages contain malicious links or attachments that deliver the malware
executable file to unsuspecting users.
|
7.
Some of these evasion techniques rely on
simple tactics,
|
g.
when it is being analyzed and to delay
execution until after it leaves the sandbox
|
Оставьте свой комментарий
Авторизуйтесь, чтобы задавать вопросы.