1.2 Flashcards
A type of malware that encrypts a victim’s files or locks their computer, demanding payment in exchange for restoring access
ransomware
A type of malware that disguises itself as legitimate software to trick victims into downloading and installing it, allowing attackers to gain unauthorized access to their system
TROJAN
A self-replicating type of malware that spreads through networks, often causing damage to computer systems
WORM
Software that is installed without the user’s consent, typically with the purpose of displaying ads or collecting data
pup POTENTIALLY UNWATNTED PROGRAM
A type of malware that operates entirely in computer memory without writing any files to disk, making it difficult to detect and remove
fileless virus
A mechanism used by attackers to communicate with malware-infected devices and control their behavior
Command and control (C&C)
type of automated cyber attack, where software programs perform malicious activities such as sending spam emails, scraping data, launching DDoS attacks, and brute-forcing passwords.
Bots
A type of malware that remains dormant until triggered by a specific event or condition, often causing damage to computer systems
Logic Bomb
Malware that secretly collects information from a victim’s device and sends it to attackers
spyware
A type of spyware that captures keystrokes made by a victim, allowing attackers to steal sensitive information such as passwords
Keylogger
A type of trojan that allows attackers to remotely control a victim’s device, often used for spying or stealing data
RAT (Remote Access Trojan)
Malware that hides its presence and activity on a victim’s device, making it difficult to detect and remove
Rootkit
A hidden entry point in software or devices that allows attackers to bypass normal security measures and gain unauthorized access
Backdoor
A brute-force password attack in which attackers try a small number of commonly-used passwords against a large number of user accounts
Spraying
A brute-force password attack in which attackers use a list of commonly-used passwords to try to gain access to a victim’s account
Dictionary Attack