2.3: Detect, Remove, and Prevent Malware

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/13

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

14 Terms

1
New cards

Malware

Malicious software that damages, disrupts, or steals data. Spreads via email attachments, malicious links, infected downloads, removable media, and drive-by downloads.

Prevented with updates, antivirus, and safe practices.

Types include viruses, worms, trojans, spyware, ransomware, rootkits, and keyloggers.

2
New cards

Trojan horse

Malicious software that disguises itself as legitimate software or file to trick users into installing it; often used to create backdoors, steal data, or download additional malware.

3
New cards

Rootkit

Malicious software designed to hide its presence and maintain privileged access to a system; can manipulate system processes and files to avoid detection.

4
New cards

Virus

Malicious software that attaches itself to files or programs and spreads when those files are shared or executed; can delete files, corrupt data, or slow system performance.

5
New cards

Boot sector virus

Malware that infects the boot sector of a storage device (HDD, SSD, or removable media), executing when the system starts; can prevent the OS from loading or spread to other drives. Blocked by UEFI Secure Boot.

6
New cards

Spyware

Malicious software that secretly monitors user activity, such as keystrokes, browsing habits, or personal data for ads, identity theft, or fraud.

7
New cards

Keylogger

Malicious software or hardware that records keystrokes to capture passwords, credit card numbers, or other sensitive information; bypasses encryption

8
New cards

Ransomware

Malicious software that encrypts files or locks a system and demands payment (ransom) for their release

9
New cards

Cryptominer

Malware that uses a victim’s computer resources (CPU/GPU) to mine cryptocurrency without consent

10
New cards

Windows Recovery Environment

A Windows troubleshooting and repair environment that can repair startup issues, restore system images, reset the PC, access command prompt, or perform system restore; typically accessed via bootable media or automatically when Windows fails to start.

11
New cards

Anti-virus/anti-malware tools

Software that detects, prevents, and removes malicious software (malware) such as viruses, worms, trojans, ransomware, spyware, and adware; uses signature-based, heuristic, and behavior-based detection methods.

Common examples include Windows Defender, Malwarebytes, Norton, and McAfee.

12
New cards

Software firewall

A program that monitors and controls incoming and outgoing network traffic on a device based on security rules; can block unauthorized access, filter traffic, and protect against malware and network attacks.

Examples include Windows Firewall and third-party firewalls like ZoneAlarm.

13
New cards

Anti-phishing training

Education programs that teach users to recognize and avoid phishing attacks, such as suspicious emails, links, or attachments; aims to reduce the risk of credential theft, malware infections, and social engineering attacks.

14
New cards

OS reinstallation

Wiping and reinstalling the operating system to fully remove malware; involves backing up data, formatting drives, and restoring only clean files. The only guaranteed way