1/9
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Virus
Malicious code that attaches itself to a legitimate host application or file. It cannot run or spread on its own; it requires a user to execute the infected file (like opening an attachment) to activate and replicate
Worm
A self-contained malware program that replicates and spreads across networks automatically without requiring any user interaction or a host file. It consumes network bandwidth and resources rapidly.
Trojan
Malware that disguises itself as legitimate, useful, or desirable software to trick the user into installing it. Unlike the other types, it does not self-replicate.
Ransomware
A type of malware that denies access to a computer system or data, usually by encrypting the files with a strong cryptographic key, and demands payment for the decryption key.
Rootkit
A clandestine set of software tools used to obtain and maintain administrator-level access to a computer while hiding its presence. It often modifies the operating system kernel or boot loader so that standard antivirus tools cannot see it.
Logic Bomb
Malicious code inserted into a system that lies dormant until a specific event or condition (like a date, time, or specific user action) occurs to trigger the payload.
Keylogger
Surveillance technology (software or hardware) that records every button pressed on a user's keyboard to capture sensitive information like passwords and credit card numbers.
RAT (Remote Access Trojan)
A specific type of malware disguised as legitimate software that provides the attacker with full administrative control over the victim's computer from a remote location.
Botnet
A network of private computers infected with malicious software and controlled as a group without the owners' knowledge. These "zombies" are often used to launch DDoS attacks or send spam.
Crypto jacking (Crypto-malware)
Malware that hides on a device and steals its computing resources (CPU/GPU) to mine cryptocurrency for the attacker.