1/19
A set of flashcards covering key terms and concepts related to malware in cybersecurity.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No study sessions yet.
Malware
Malicious software designed to harm, exploit, or otherwise compromise a computer system.
Virus
A type of malware that self-replicates by inserting copies of itself into other executable code.
Worm
Malware that self-replicates and propagates across networks, often exploiting software vulnerabilities.
Trojan Horse
Malicious code that is disguised as legitimate software, which is willingly installed by the victim.
Keylogger
A type of malware that records keystrokes, capturing sensitive information like credentials.
Spyware
Software that collects information in an unauthorized manner and sends it to an attacker.
Adware
Potentially unwanted software that displays advertisements, usually bundled with legitimate software.
Rootkit
Malware that allows continued access to a computer while hiding its presence from the operating system.
Logic Bomb
Code that triggers a malicious action upon the occurrence of a specific event or condition.
Drive-by-download
A compromised website that installs malware on a client’s machine without their knowledge during site access.
Zombie/Bot
A compromised machine controlled by an attacker, often used as part of a larger botnet.
Macro Virus
A type of malware embedded in word processing files that executes automatically when the file is opened.
Persistent Threat
Attacks that are characterized by being conducted over a long term with careful planning and execution.
Exploit
Targeted code that takes advantage of vulnerabilities in a system to execute unauthorized actions.
Downloader
Malware that imports and installs other malicious code onto a system.
Attack Kit
A suite of tools designed to create new malware variants or automate attacks.
Phishing
A social engineering technique where attackers impersonate trusted entities to trick individuals into divulging sensitive information.
Ransomware
A type of malware that encrypts a victim's files and demands a ransom payment, typically in cryptocurrency, for decryption.
Denial of Service (DoS)
An attack designed to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.
Spoofing
The act of disguising a communication from an unknown source as being from a known, trusted source.