2.3: Detect, Remove, and Prevent Malware

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/13

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

14 Terms

1
New cards

Malware

Malicious software that damages, disrupts, or steals data. Spreads via email attachments, malicious links, infected downloads, removable media, and drive-by downloads.

Prevented with updates, antivirus, and safe practices.

Types include viruses, worms, trojans, spyware, ransomware, rootkits, and keyloggers.

2
New cards

Trojan horse

Malicious software that disguises itself as legitimate software or file to trick users into installing it; often used to create backdoors, steal data, or download additional malware.

3
New cards

Rootkit

Malicious software designed to hide its presence and maintain privileged access to a system; can manipulate system processes and files to avoid detection.

4
New cards

Virus

Malicious software that attaches itself to files or programs and spreads when those files are shared or executed; can delete files, corrupt data, or slow system performance.

5
New cards

Boot sector virus

Malware that infects the boot sector of a storage device (HDD, SSD, or removable media), executing when the system starts; can prevent the OS from loading or spread to other drives. Blocked by UEFI Secure Boot.

6
New cards

Spyware

Malicious software that secretly monitors user activity, such as keystrokes, browsing habits, or personal data for ads, identity theft, or fraud.

7
New cards

Keylogger

Malicious software or hardware that records keystrokes to capture passwords, credit card numbers, or other sensitive information; bypasses encryption

8
New cards

Ransomware

Malicious software that encrypts files or locks a system and demands payment (ransom) for their release

9
New cards

Cryptominer

Malware that uses a victim’s computer resources (CPU/GPU) to mine cryptocurrency without consent

10
New cards

Windows Recovery Environment

A Windows troubleshooting and repair environment that can repair startup issues, restore system images, reset the PC, access command prompt, or perform system restore; typically accessed via bootable media or automatically when Windows fails to start.

11
New cards

Anti-virus/anti-malware tools

Software that detects, prevents, and removes malicious software (malware) such as viruses, worms, trojans, ransomware, spyware, and adware; uses signature-based, heuristic, and behavior-based detection methods.

Common examples include Windows Defender, Malwarebytes, Norton, and McAfee.

12
New cards

Software firewall

A program that monitors and controls incoming and outgoing network traffic on a device based on security rules; can block unauthorized access, filter traffic, and protect against malware and network attacks.

Examples include Windows Firewall and third-party firewalls like ZoneAlarm.

13
New cards

Anti-phishing training

Education programs that teach users to recognize and avoid phishing attacks, such as suspicious emails, links, or attachments; aims to reduce the risk of credential theft, malware infections, and social engineering attacks.

14
New cards

OS reinstallation

Wiping and reinstalling the operating system to fully remove malware; involves backing up data, formatting drives, and restoring only clean files. The only guaranteed way