Malware/Viruses

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/9

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

10 Terms

1
New cards

Virus

Malicious code that attaches itself to a legitimate host application or file. It cannot run or spread on its own; it requires a user to execute the infected file (like opening an attachment) to activate and replicate

2
New cards

Worm

A self-contained malware program that replicates and spreads across networks automatically without requiring any user interaction or a host file. It consumes network bandwidth and resources rapidly.

3
New cards

Trojan

Malware that disguises itself as legitimate, useful, or desirable software to trick the user into installing it. Unlike the other types, it does not self-replicate.

4
New cards

Ransomware

A type of malware that denies access to a computer system or data, usually by encrypting the files with a strong cryptographic key, and demands payment for the decryption key.

5
New cards

Rootkit

A clandestine set of software tools used to obtain and maintain administrator-level access to a computer while hiding its presence. It often modifies the operating system kernel or boot loader so that standard antivirus tools cannot see it.

6
New cards

Logic Bomb

Malicious code inserted into a system that lies dormant until a specific event or condition (like a date, time, or specific user action) occurs to trigger the payload.

7
New cards

Keylogger

Surveillance technology (software or hardware) that records every button pressed on a user's keyboard to capture sensitive information like passwords and credit card numbers.

8
New cards

RAT (Remote Access Trojan)

A specific type of malware disguised as legitimate software that provides the attacker with full administrative control over the victim's computer from a remote location.

9
New cards

Botnet

A network of private computers infected with malicious software and controlled as a group without the owners' knowledge. These "zombies" are often used to launch DDoS attacks or send spam.

10
New cards

Crypto jacking (Crypto-malware)

Malware that hides on a device and steals its computing resources (CPU/GPU) to mine cryptocurrency for the attacker.