1/4
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
KeyLogger
Capture Keystrokes
Resolution: Encryption Protections
Logic Bomb
Malware waits for event to get triggered
Timed Bomb
Difficult to recover & identify
Logic Bomb Prevention
Electric Monitoring
Process and Procedures
Auditing
Rootkits
Have full control of PC (Undetectable in OS)
Modifies core system files (Kernel Level)
Finding & Removing Rootkits
Secure Boot
Rootkit remover