1/8
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Malware
designed to infiltrate a computer system and possibly damage it without the user’s knowledge or consent
-bad software code that wants to do harm to our computers and networks
Virus
made up of malicious code that is run on a machine without the user’s knowledge and infects it whenever that code is run
Worm
a piece of malicious sofrware that can replicate itself without user interaction
Trojan horse
a piece of malicious software disguised as a piece of harmless or desirable software
Remote Access Trojan (RAT)
provides the attacker with remote control of a victim machine
Ransomware
type of malware that restricts access to a victim’s computer system or their files until a ransom or payment is received
Spyware
type of malicious software that’s installed on the system and gathers user information without the user’s consent
keylogger
captures any key strokes made on the victim machine
Rootkit
specific type of software that’s designed to gain adminstrative level control over a computer system or network device without being detected