Ontology of Malware

0.0(0)
studied byStudied by 10 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/7

flashcard set

Earn XP

Description and Tags

Flashcards about types of malware based on lecture notes.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

8 Terms

1
New cards

Spyware

Unwanted software that infiltrates a computing device and steals Internet usage data and sensitive information. A type of malware designed to gain access or damage computers, often without one’s knowledge. It also gathers personal information and relays it to advertisers, data firms, or external users.

2
New cards

Adware

Unwanted software designed to throw advertisements up on the screen, most often within a Web browser. Some security professionals view it as the forerunner of the modern-day PUP (potentially unwanted program).

3
New cards

Rootkit

A clandestine computer program designed to provide continued privileged access to a computer while actively hiding its presence. It allows someone to maintain command and control over a computer without the user/owner knowing about it.

4
New cards

Ransomware

A form of malicious software that, once it’s taken over the computer, threatens with harm usually by denying the user access to his/her data. The attacker demands a ransom from the victim, promising to restore access to the data upon payment.

5
New cards

Computer Worm

A type of malware that spreads copies of itself from a computer. A worm replicates itself without any human interaction and does not need to attach itself to a software program to cause damage.

6
New cards

Trojan Horse

A type of malicious code or software that looks legitimate but can take control of one’s computer. It is designed to damage, disrupt, steal, or inflict some other harmful action on your data or network in general. It acts like a bona fide application or file to trick a user.

7
New cards

Backdoor

A type of malware that negates normal authentication procedures to access a system. As a result, remote access is granted to resources within an application, such as databases and file servers, giving perpetrators the ability to issue system commands remotely and update malware.

8
New cards

Cybersecurity awareness

promotes foundational understandings on cyber threats and risk, cyber hygiene, and appropriate response options. It informs citizens on best practices and proactive measures when confronted with cyber risks