Types of Malware and their Function

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/15

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 6:58 PM on 8/12/24
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

16 Terms

1
New cards

Virus

A type of malware that replicates by modifying other programs and inserting its code to spread to other programs.

2
New cards

Worm

Standalone malware that replicates itself to spread to other computers through networks without needing a host program.

3
New cards

Trojan

Malware that disguises itself as a legitimate program to deceive users about its true purpose and can cause harm once installed.

4
New cards

Remote Access Trojan (RAT)

Malware that enables remote control of a computer over the internet, allowing actions like moving the mouse or accessing the webcam.

5
New cards

Backdoor

A method that permits unauthorized users to bypass security measures and gain access to a system.

6
New cards

Rootkit

Malicious software tools that provide remote access and control over a computer while evading detection by disabling antivirus software.

7
New cards

Spyware

Malware that covertly collects user information such as browsing history, usernames, passwords, and emails.

8
New cards

Keylogger

Spyware that records keystrokes on a keyboard and sends the data to cybercriminals.

9
New cards

Ransomware

Malware that blocks access to personal data and demands a ransom for restoration.

10
New cards

Fileless Malware

Malware that operates in a computer's memory (RAM) without leaving traces on the hard drive, making detection challenging.

11
New cards

Adware

Malware that displays unwanted ads and gathers user data for targeted advertising purposes.

12
New cards

RAM Scraper

Malware that targets point-of-sale systems to steal personal information like credit card numbers and PINs.

13
New cards

Browser Hijacker

Malware that alters web browser settings without user consent, changing homepages, search engines, or injecting ads.

14
New cards

Cryptojacker

Malware that secretly uses a computer's resources to mine cryptocurrencies, often slowing down the system.

15
New cards

Rogue Security Software

Malware that deceives users into believing their system is infected and prompts them to pay for a fake removal tool that installs more malware.

16
New cards

Wiper

Malware designed to erase a computer's memory, destroying all useful information stored on the system.