1/22
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Malware
Malicious software designed to harm or impede regular computer functions.
Trojan
Malware disguised as a non-malicious file that tricks users into executing it; not focused on replication - they are typically spread by social engineering.
Rootkit
Malware that embeds deep into operating systems, modifying core system files; may require a specific AV tool for removal.
Virus
Malware that replicates from computer to computer but needs human execution to start.
Spyware
Software designed to gather information without the user's knowledge, often used for tracking online activity.
Ransomware
Malicious software that encrypts files, demanding ransom for decryption while keeping the OS running.
Keylogger
Malware that captures keyboard input to obtain sensitive data such as usernames and passwords.
Boot sector virus
A virus that embeds itself into the boot sector of a hard drive, relaunching every time the operating system starts.
Cryptominer
Malware that utilizes the victim's computer resources for cryptocurrency mining.
Stalkerware
Malware designed for unwanted surveillance of individuals, often operating in stealth mode.
Fileless malware
Malicious software that operates in system memory, leaving no trace on the hard drive.
Adware
Software that displays or downloads unwanted advertising material when online.
Potentially unwanted program (PUP)
A program that may be unwanted, often downloaded alongside desired software.
Windows Recovery Environment
A command line environment that operates from the recovery partition and allows full administrative control over Windows, enabling malware removal before the system boots.
Endpoint detection and response (EDR)
Security solution that continuously monitors for and responds to advanced threats on endpoints.
Managed detection and response (MDR)
Service using human expertise and automated tools to monitor, detect, and respond to threats.
Extended detection and response (XDR)
Cybersecurity approach integrating data from multiple sources (endpoints, networks, cloud, etc.) to provide a comprehensive view of threats.
Antivirus
Software designed to identify, contain, and remove viruses from systems.
Anti-malware
Software designed to identify, contain, and remove malware from systems.
Email security gateway (SEG)
Product that analyzes and filters malicious emails before they reach users' inboxes.
Software firewall
Software controlling network communications, preventing malware from accessing an OS.
Antiphishing training
Training that helps users recognize and avoid phishing attempts and suspicious activities.
OS reinstallation
Reinstalling an operating system to remove a malware infection, or restoring from a backup.