1/16
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No study sessions yet.
Malware
malicious software designed to damage, disrupt, or gain unauthorized access to computer systems
Drive-by download
an attack where malicious software is downloaded automatically when a user visits a compromised or malicious website—without the user clicking or agreeing to anything
Ransomware
malware that encrypts a victim’s files or locks their system and demands payment to restore access.
Virus
malware that attaches itself to files or programs and spreads when the infected file is executed, often damaging data or disrupting systems
Boot sector virus
a malicious program that hides in the startup area of a drive and activates before the operating system load
Script Virus
malware written in a scripting language that executes automatically when a script-enabled file or webpage runs
Macro Virus
Malicious code embedded inside document macros that triggers when the document is opened or edited.
Fileless Virus
a type of malware that operates in memory without creating or modifying files on the disk, making it harder to detect.
Worms
a type of malware that can self-replicate and spread across computer networks without user interaction
Wannacry worm
ransomware that attempts to exploit vulnerabilities in the Windows SMBv1 server to remotely compromise systems, encrypt files, and spread to other hosts
Spyware
a type of malware that secretly infects a device to collect information without the user's knowledge or consent
Keylogger
type of malware, either software or hardware, that records every keystroke on a user's device to steal sensitive information
Bloatware
software pre-installed on a new device by the manufacturer or bundled with other downloads
Logic bomb
piece of malicious code intentionally inserted into a software system that lies dormant until specific conditions are met, at which point it triggers a destructive function
Rootkit
malicious software that gives an attacker administrator-level access to a computer system while actively hiding its presence
Secure boot
a security feature in UEFI firmware that prevents unauthorized software, like rootkits, from loading during the computer's startup process by verifying the digital signature of boot components
Trojan horse
type of malicious software that disguises itself as legitimate or harmless to trick users into installing it