Malware Attacks

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/8

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

9 Terms

1
New cards

Malware

designed to infiltrate a computer system and possibly damage it without the user’s knowledge or consent

-bad software code that wants to do harm to our computers and networks

2
New cards

Virus

made up of malicious code that is run on a machine without the user’s knowledge and infects it whenever that code is run

3
New cards

Worm

a piece of malicious sofrware that can replicate itself without user interaction

4
New cards

Trojan horse

a piece of malicious software disguised as a piece of harmless or desirable software

5
New cards

Remote Access Trojan (RAT)

provides the attacker with remote control of a victim machine

6
New cards

Ransomware

type of malware that restricts access to a victim’s computer system or their files until a ransom or payment is received

7
New cards

Spyware

type of malicious software that’s installed on the system and gathers user information without the user’s consent

8
New cards

keylogger

captures any key strokes made on the victim machine

9
New cards

Rootkit

specific type of software that’s designed to gain adminstrative level control over a computer system or network device without being detected