Cybersecurity Malware Types: Definitions and Functions

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/10

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

11 Terms

1
New cards

Virus

Malicious code that attaches to legitimate files and spreads when executed; requires user action.

2
New cards

Worm

Self-replicating malware that spreads across networks without user interaction.

3
New cards

Trojan Horse

Disguises itself as a legitimate program; often creates backdoors for attackers.

4
New cards

Rootkit

Hides deep in the OS to avoid detection and maintain privileged access; disables security tools.

5
New cards

Spyware

Secretly monitors user activity and sends data to attackers; often used for credential theft.

6
New cards

Adware

Displays unwanted ads and may track user behavior; sometimes bundled with free software.

7
New cards

Ransomware

Encrypts files and demands payment for decryption; often spread via phishing or exploits.

8
New cards

Keylogger

Records keystrokes to steal sensitive information; can be software or hardware-based.

9
New cards

Botnet

Network of infected devices controlled remotely; used for DDoS, spam, or crypto mining.

10
New cards

Logic Bomb

Malicious code triggered by specific conditions like dates or events; hidden until activated.

11
New cards

Backdoor

Bypasses normal authentication to allow remote access; often installed by Trojans.