MALWARE

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/23

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 5:22 AM on 12/12/23
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

24 Terms

1
New cards

Malware

A program designed to gain unauthorized access to computer systems and harm or exploit them without the user's permission.

2
New cards

Virus

A type of malware that attaches itself to executable files and spreads when the infected file is passed from system to system. It can replicate, modify or delete data, and perform harmful activities.

3
New cards

Worm

A type of malware that replicates itself on a system and spreads through computer networks. It can run by itself and spread quickly, causing network slowdowns and disruptions.

4
New cards

Trojan Horse

A type of malware that disguises itself as a desired operation, such as playing an online game, but carries out malicious actions like stealing data or providing unauthorized access to attackers. It does not replicate on its own.

5
New cards

Ransomware

Malware that encrypts data on a computer system and demands a ransom for its release. It prevents the victim from accessing their data until the ransom is paid.

6
New cards

Adware

Malware that displays unwanted ads and pop-ups on a computer. It generates revenue for the software distributor by displaying ads.

7
New cards

Spyware

Malware that steals private information from a computer system and sends it to a third party, often for malicious purposes.

8
New cards

Keyloggers

Malware that records keystrokes on a computer or device, enabling attackers to capture sensitive information like passwords and credit card numbers.

9
New cards

Rootkits

Malware that burrows deep into an operating system, making it difficult to detect and remove. It grants attackers full control over a compromised system.

10
New cards

Botnets

Networks of compromised computers controlled by a central entity. Attackers use botnets for various purposes, such as launching DDoS attacks or distributing spam.

11
New cards

Fileless malware

Malware that resides in a computer's RAM and doesn't leave traditional file traces on disk, making it difficult to detect. It is used for stealthy attacks.

12
New cards

Mobile malware

Malware specifically designed for mobile devices, including smartphones and tablets. It can steal personal data, send premium SMS messages, or hijack mobile banking sessions.

13
New cards

Scareware

Malware that tricks users into believing their computers are infected and prompts them to purchase fake antivirus or security software.

14
New cards

Unusual Computer Behavior

An indication that a device may be infected with malware, such as slow performance, crashes, or unexpected pop-ups.

15
New cards

High CPU or Memory Usage

An indication that a device may be infected with malware, as malware often consumes system resources.

16
New cards

Security Software Alerts

Notifications from security software indicating the presence of malware on a device.

17
New cards

Changed Browser Settings

Changes in browser settings, such as homepage or search engine, without the user's consent, may indicate malware infection.

18
New cards

Excessive Data Usage

Unusually high data usage on a device, which may be caused by malware activities.

19
New cards

Update Your Software

One of the steps to take if you suspect your device is infected with malware, as software updates often include security patches.

20
New cards

Run a Full Malware Scan

Another step to take if you suspect malware, running a full scan with antivirus or anti-malware software to detect and remove any malicious programs.

21
New cards

Disconnect from the Internet

Disconnecting from the internet can help prevent malware from spreading or communicating with its command and control servers.

22
New cards

Change Passwords

Changing passwords for online accounts is recommended to prevent unauthorized access by malware.

23
New cards

Restore from Backup

If available, restoring the device from a previous backup can help remove malware and restore a clean state.

24
New cards

Seek Professional Help

If unable to remove malware or if the infection is severe, seeking professional help from cybersecurity experts is recommended.