Malware

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/19

flashcard set

Earn XP

Description and Tags

A set of flashcards covering key terms and concepts related to malware in cybersecurity.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

20 Terms

1
New cards

Malware

Malicious software designed to harm, exploit, or otherwise compromise a computer system.

2
New cards

Virus

A type of malware that self-replicates by inserting copies of itself into other executable code.

3
New cards

Worm

Malware that self-replicates and propagates across networks, often exploiting software vulnerabilities.

4
New cards

Trojan Horse

Malicious code that is disguised as legitimate software, which is willingly installed by the victim.

5
New cards

Keylogger

A type of malware that records keystrokes, capturing sensitive information like credentials.

6
New cards

Spyware

Software that collects information in an unauthorized manner and sends it to an attacker.

7
New cards

Adware

Potentially unwanted software that displays advertisements, usually bundled with legitimate software.

8
New cards

Rootkit

Malware that allows continued access to a computer while hiding its presence from the operating system.

9
New cards

Logic Bomb

Code that triggers a malicious action upon the occurrence of a specific event or condition.

10
New cards

Drive-by-download

A compromised website that installs malware on a client’s machine without their knowledge during site access.

11
New cards

Zombie/Bot

A compromised machine controlled by an attacker, often used as part of a larger botnet.

12
New cards

Macro Virus

A type of malware embedded in word processing files that executes automatically when the file is opened.

13
New cards

Persistent Threat

Attacks that are characterized by being conducted over a long term with careful planning and execution.

14
New cards

Exploit

Targeted code that takes advantage of vulnerabilities in a system to execute unauthorized actions.

15
New cards

Downloader

Malware that imports and installs other malicious code onto a system.

16
New cards

Attack Kit

A suite of tools designed to create new malware variants or automate attacks.

17
New cards

Phishing

A social engineering technique where attackers impersonate trusted entities to trick individuals into divulging sensitive information.

18
New cards

Ransomware

A type of malware that encrypts a victim's files and demands a ransom payment, typically in cryptocurrency, for decryption.

19
New cards

Denial of Service (DoS)

An attack designed to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.

20
New cards

Spoofing

The act of disguising a communication from an unknown source as being from a known, trusted source.