MALWARE

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/14

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

15 Terms

1
New cards

Computer Security Threats

are dangers that can harm your computer system, compromise your data, or disrupt operations. They can come from malicious software, hackers, or even careless user behavior.

2
New cards

Malware

programs designed to harm or exploit computers.

3
New cards

Social Engineering

manipulation techniques that trick people into giving up confidential information.

4
New cards

Network and System Attacks

attempts to steal, disrupt, or destroy information systems.

5
New cards

Malware Threats

any program or code created to damage, disrupt, or gain unauthorized access to computers, networks, or data

6
New cards

Malware Threats

is any software that does something harmful to your computer or your data.

  • Steal sensitive information (passwords, credit card numbers, etc.)

  • Spy on user activities

  • Disrupt normal operations

  • Extort money (ransomware)

  • Gain control of a system or network

  • Damage reputations or systems for revenge or competition

7
New cards

Virus

Attaches itself to a legitimate file or program and spreads when that file is run.

EXAMPLE

The “ILOVEYOU” virus (2000, Philippines) spread via email attachments.

8
New cards

Worm

Self-replicating malware that spreads automatically across networks without user action.

EXAMPLE

The “Conficker” worm infected millions of computers worldwide.

9
New cards

Trojan Horse

Pretends to be useful software but secretly performs malicious actions

EXAMPLE

A fake antivirus that installs malware instead of removing it.

10
New cards

Spyware

Secretly monitors and records user activities, often to steal credentials.

EXAMPLE

Keyloggers capturing typed passwords

11
New cards

Adware

Displays unwanted advertisements; sometimes tracks browsing habits.

EXAMPLE

Pop-up ads that appear even when offline.

12
New cards

Ransomware

Locks or encrypts data and demands payment to restore access

EXAMPLE

The “WannaCry” ransomware attack (2017) hit hospitals and companies.

13
New cards

Rootkit

Hides malicious processes or files from detection by antivirus software

EXAMPLE

Used to maintain long-term hidden access to a system.

14
New cards

Botnets

A network of infected computers (bots) controlled remotely by hackers.

EXAMPLE

Used for launching large-scale attacks or spam campaigns.

15
New cards

Logic Bomb

Malicious code that activates when specific conditions are met

EXAMPLE

Deletes files on a specific date or event.