1/14
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No study sessions yet.
Computer Security Threats
are dangers that can harm your computer system, compromise your data, or disrupt operations. They can come from malicious software, hackers, or even careless user behavior.
Malware
programs designed to harm or exploit computers.
Social Engineering
manipulation techniques that trick people into giving up confidential information.
Network and System Attacks
attempts to steal, disrupt, or destroy information systems.
Malware Threats
any program or code created to damage, disrupt, or gain unauthorized access to computers, networks, or data
Malware Threats
is any software that does something harmful to your computer or your data.
Steal sensitive information (passwords, credit card numbers, etc.)
Spy on user activities
Disrupt normal operations
Extort money (ransomware)
Gain control of a system or network
Damage reputations or systems for revenge or competition
Virus
Attaches itself to a legitimate file or program and spreads when that file is run.
EXAMPLE
The “ILOVEYOU” virus (2000, Philippines) spread via email attachments.
Worm
Self-replicating malware that spreads automatically across networks without user action.
EXAMPLE
The “Conficker” worm infected millions of computers worldwide.
Trojan Horse
Pretends to be useful software but secretly performs malicious actions
EXAMPLE
A fake antivirus that installs malware instead of removing it.
Spyware
Secretly monitors and records user activities, often to steal credentials.
EXAMPLE
Keyloggers capturing typed passwords
Adware
Displays unwanted advertisements; sometimes tracks browsing habits.
EXAMPLE
Pop-up ads that appear even when offline.
Ransomware
Locks or encrypts data and demands payment to restore access
EXAMPLE
The “WannaCry” ransomware attack (2017) hit hospitals and companies.
Rootkit
Hides malicious processes or files from detection by antivirus software
EXAMPLE
Used to maintain long-term hidden access to a system.
Botnets
A network of infected computers (bots) controlled remotely by hackers.
EXAMPLE
Used for launching large-scale attacks or spam campaigns.
Logic Bomb
Malicious code that activates when specific conditions are met
EXAMPLE
Deletes files on a specific date or event.