1/7
Flashcards about types of malware based on lecture notes.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Spyware
Unwanted software that infiltrates a computing device and steals Internet usage data and sensitive information. A type of malware designed to gain access or damage computers, often without one’s knowledge. It also gathers personal information and relays it to advertisers, data firms, or external users.
Adware
Unwanted software designed to throw advertisements up on the screen, most often within a Web browser. Some security professionals view it as the forerunner of the modern-day PUP (potentially unwanted program).
Rootkit
A clandestine computer program designed to provide continued privileged access to a computer while actively hiding its presence. It allows someone to maintain command and control over a computer without the user/owner knowing about it.
Ransomware
A form of malicious software that, once it’s taken over the computer, threatens with harm usually by denying the user access to his/her data. The attacker demands a ransom from the victim, promising to restore access to the data upon payment.
Computer Worm
A type of malware that spreads copies of itself from a computer. A worm replicates itself without any human interaction and does not need to attach itself to a software program to cause damage.
Trojan Horse
A type of malicious code or software that looks legitimate but can take control of one’s computer. It is designed to damage, disrupt, steal, or inflict some other harmful action on your data or network in general. It acts like a bona fide application or file to trick a user.
Backdoor
A type of malware that negates normal authentication procedures to access a system. As a result, remote access is granted to resources within an application, such as databases and file servers, giving perpetrators the ability to issue system commands remotely and update malware.
Cybersecurity awareness
promotes foundational understandings on cyber threats and risk, cyber hygiene, and appropriate response options. It informs citizens on best practices and proactive measures when confronted with cyber risks