1/8
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Virus
replicate itself and transfer from one computer to another either internet and local networks or data storage
Worm
- transfers from on a computer to another by any type of means. Often uses a computer network to spread itself.
Trojan
it disguised as a useful program but once downloaded or installed, leaves your PC or gadget unprotected and allows hackers to
Rogue security software
tricks the user into posing that it is a security software. It asks the user to pay to improve his/her security but in reality they are not protected at all.
Spyware
a program that runs in the background without you knowing it and has the ability to monitor what you are currently doing and typing through keylogging.
Keyloggers
used the keystroke done by the users. This can steal their password or any other sensitive information.
Adware
it designed to send you advertisements, mostly as pop ups.
SPAM
unwanted emails mostly form bots or advertisers, It can be used to send malware.
PHISHING
the goal is to acquire sensitive personal information like passwords and credit cards details.