1/12
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Computer virus
Computer files that reproduce and cause damage
Metamorphic virus
Computer virus that acts like a biological virus
Malware
Programs that penetrate or damage a computer system
Experimental malware
Malware created for research purposes
Prank malware
Malware created for amusement or mischief
Financial gain malware
Malware used for identity theft or spying
Worm
Self-replicating program that spreads through networks
Trojan horse
Program that appears harmless but releases harmful viruses or worms
Spyware
Covertly installed program that monitors and controls a computer
Adware
Program that displays or downloads advertising to a computer
Spamming
Sending unsolicited bulk messages through email or other platforms
Denial-of-service attack
Attempt to make a computer or its resources unavailable to users
Reverse Phishing
Logging keystrokes to breach a workstation's security