1/11
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Virus
Malicious code that attaches itself to a host application, infecting other files and replicating, usually requiring user action to spread.
Worm
Self-replicating malware that spreads automatically across networks without user interaction, exploiting vulnerabilities.
Trojan Horse
Software that appears legitimate but performs malicious actions behind the scenes, such as installing a backdoor.
Ransomware
Malware that encrypts files or locks users out of their system, demanding payment to restore access.
Spyware
Software that monitors user activity, collects personal data, and sends it to third parties.
Keylogger
A type of spyware that records keystrokes to steal passwords and sensitive information.
Rootkit
Malware designed to gain elevated, administrative access (root) to a system while hiding its presence from the operating system.
Backdoor
A method, often installed by other malware, that allows attackers to bypass security and access a system remotely.
Botnet/Bot
A network of infected computers (zombies) controlled by a central attacker, often used for DDoS attacks.
Adware
Software designed to force advertisements, often tracking browsing behavior.
Fileless
a stealthy cyberattack that operates directly in a system's RAM, utilizing legitimate tools like PowerShell or WMI to execute malicious code without downloading files to the hard drive
Stalkerware
is monitoring software or malicious apps used for covert surveillance by abusers to track partners or individuals without consent. It acts in stealth mode to log keystrokes, track GPS location, record audio/video, and access private messages, often disguised as system processes.