1/23
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Malware
A program designed to gain unauthorized access to computer systems and harm or exploit them without the user's permission.
Virus
A type of malware that attaches itself to executable files and spreads when the infected file is passed from system to system. It can replicate, modify or delete data, and perform harmful activities.
Worm
A type of malware that replicates itself on a system and spreads through computer networks. It can run by itself and spread quickly, causing network slowdowns and disruptions.
Trojan Horse
A type of malware that disguises itself as a desired operation, such as playing an online game, but carries out malicious actions like stealing data or providing unauthorized access to attackers. It does not replicate on its own.
Ransomware
Malware that encrypts data on a computer system and demands a ransom for its release. It prevents the victim from accessing their data until the ransom is paid.
Adware
Malware that displays unwanted ads and pop-ups on a computer. It generates revenue for the software distributor by displaying ads.
Spyware
Malware that steals private information from a computer system and sends it to a third party, often for malicious purposes.
Keyloggers
Malware that records keystrokes on a computer or device, enabling attackers to capture sensitive information like passwords and credit card numbers.
Rootkits
Malware that burrows deep into an operating system, making it difficult to detect and remove. It grants attackers full control over a compromised system.
Botnets
Networks of compromised computers controlled by a central entity. Attackers use botnets for various purposes, such as launching DDoS attacks or distributing spam.
Fileless malware
Malware that resides in a computer's RAM and doesn't leave traditional file traces on disk, making it difficult to detect. It is used for stealthy attacks.
Mobile malware
Malware specifically designed for mobile devices, including smartphones and tablets. It can steal personal data, send premium SMS messages, or hijack mobile banking sessions.
Scareware
Malware that tricks users into believing their computers are infected and prompts them to purchase fake antivirus or security software.
Unusual Computer Behavior
An indication that a device may be infected with malware, such as slow performance, crashes, or unexpected pop-ups.
High CPU or Memory Usage
An indication that a device may be infected with malware, as malware often consumes system resources.
Security Software Alerts
Notifications from security software indicating the presence of malware on a device.
Changed Browser Settings
Changes in browser settings, such as homepage or search engine, without the user's consent, may indicate malware infection.
Excessive Data Usage
Unusually high data usage on a device, which may be caused by malware activities.
Update Your Software
One of the steps to take if you suspect your device is infected with malware, as software updates often include security patches.
Run a Full Malware Scan
Another step to take if you suspect malware, running a full scan with antivirus or anti-malware software to detect and remove any malicious programs.
Disconnect from the Internet
Disconnecting from the internet can help prevent malware from spreading or communicating with its command and control servers.
Change Passwords
Changing passwords for online accounts is recommended to prevent unauthorized access by malware.
Restore from Backup
If available, restoring the device from a previous backup can help remove malware and restore a clean state.
Seek Professional Help
If unable to remove malware or if the infection is severe, seeking professional help from cybersecurity experts is recommended.