Malware

0.0(0)
Studied by 4 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/11

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 12:38 PM on 4/9/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

12 Terms

1
New cards

Virus

Malicious code that attaches itself to a host application, infecting other files and replicating, usually requiring user action to spread.

2
New cards

Worm

Self-replicating malware that spreads automatically across networks without user interaction, exploiting vulnerabilities.

3
New cards

Trojan Horse

Software that appears legitimate but performs malicious actions behind the scenes, such as installing a backdoor.

4
New cards

Ransomware

Malware that encrypts files or locks users out of their system, demanding payment to restore access.

5
New cards

Spyware

Software that monitors user activity, collects personal data, and sends it to third parties.

6
New cards

Keylogger

A type of spyware that records keystrokes to steal passwords and sensitive information.

7
New cards

Rootkit

Malware designed to gain elevated, administrative access (root) to a system while hiding its presence from the operating system.

8
New cards

Backdoor

A method, often installed by other malware, that allows attackers to bypass security and access a system remotely.

9
New cards

Botnet/Bot

A network of infected computers (zombies) controlled by a central attacker, often used for DDoS attacks.

10
New cards

Adware

Software designed to force advertisements, often tracking browsing behavior.

11
New cards

Fileless

a stealthy cyberattack that operates directly in a system's RAM, utilizing legitimate tools like PowerShell or WMI to execute malicious code without downloading files to the hard drive

12
New cards

Stalkerware

is monitoring software or malicious apps used for covert surveillance by abusers to track partners or individuals without consent. It acts in stealth mode to log keystrokes, track GPS location, record audio/video, and access private messages, often disguised as system processes.