Malware (sec +)

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/16

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

17 Terms

1
New cards

Malware

malicious software designed to damage, disrupt, or gain unauthorized access to computer systems

2
New cards

Drive-by download

an attack where malicious software is downloaded automatically when a user visits a compromised or malicious website—without the user clicking or agreeing to anything

3
New cards

Ransomware

malware that encrypts a victim’s files or locks their system and demands payment to restore access.

4
New cards

Virus

malware that attaches itself to files or programs and spreads when the infected file is executed, often damaging data or disrupting systems

5
New cards

Boot sector virus

a malicious program that hides in the startup area of a drive and activates before the operating system load

6
New cards

Script Virus

malware written in a scripting language that executes automatically when a script-enabled file or webpage runs

7
New cards

Macro Virus

Malicious code embedded inside document macros that triggers when the document is opened or edited.

8
New cards

Fileless Virus

a type of malware that operates in memory without creating or modifying files on the disk, making it harder to detect.

9
New cards

Worms

a type of malware that can self-replicate and spread across computer networks without user interaction

10
New cards

Wannacry worm

ransomware that attempts to exploit vulnerabilities in the Windows SMBv1 server to remotely compromise systems, encrypt files, and spread to other hosts

11
New cards

Spyware

a type of malware that secretly infects a device to collect information without the user's knowledge or consent

12
New cards

Keylogger

type of malware, either software or hardware, that records every keystroke on a user's device to steal sensitive information

13
New cards

Bloatware

software pre-installed on a new device by the manufacturer or bundled with other downloads

14
New cards

Logic bomb

piece of malicious code intentionally inserted into a software system that lies dormant until specific conditions are met, at which point it triggers a destructive function

15
New cards

Rootkit

malicious software that gives an attacker administrator-level access to a computer system while actively hiding its presence

16
New cards

Secure boot

a security feature in UEFI firmware that prevents unauthorized software, like rootkits, from loading during the computer's startup process by verifying the digital signature of boot components

17
New cards

Trojan horse

type of malicious software that disguises itself as legitimate or harmless to trick users into installing it