Malware/Viruses

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/9

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

10 Terms

1
New cards

Virus

Malicious code that attaches itself to a legitimate host application or file. It cannot run or spread on its own; it requires a user to execute the infected file (like opening an attachment) to activate and replicate

2
New cards

Worm

A self-contained malware program that replicates and spreads across networks automatically without requiring any user interaction or a host file. It consumes network bandwidth and resources rapidly.

3
New cards

Trojan

Malware that disguises itself as legitimate, useful, or desirable software to trick the user into installing it. Unlike the other types, it does not self-replicate.

4
New cards

Ransomware

A type of malware that denies access to a computer system or data, usually by encrypting the files with a strong cryptographic key, and demands payment for the decryption key.

5
New cards

Rootkit

A clandestine set of software tools used to obtain and maintain administrator-level access to a computer while hiding its presence. It often modifies the operating system kernel or boot loader so that standard antivirus tools cannot see it.

6
New cards

Logic Bomb

Malicious code inserted into a system that lies dormant until a specific event or condition (like a date, time, or specific user action) occurs to trigger the payload.

7
New cards

Keylogger

Surveillance technology (software or hardware) that records every button pressed on a user's keyboard to capture sensitive information like passwords and credit card numbers.

8
New cards

RAT (Remote Access Trojan)

A specific type of malware disguised as legitimate software that provides the attacker with full administrative control over the victim's computer from a remote location.

9
New cards

Botnet

A network of private computers infected with malicious software and controlled as a group without the owners' knowledge. These "zombies" are often used to launch DDoS attacks or send spam.

10
New cards

Crypto jacking (Crypto-malware)

Malware that hides on a device and steals its computing resources (CPU/GPU) to mine cryptocurrency for the attacker.