3: Social Engineering Flashcards
Malware
Malicious software designed to infiltrate computer systems and potentially
damage them without user consent
Viruses
Attach to clean files, spread, and corrupt host files
Worms
Standalone programs replicating and spreading to other computers
Trojans
Disguise as legitimate software, grant unauthorized access
Ransomware
Encrypts user data, demands ransom for decryption
Zombies and Botnets
Compromised computers remotely controlled in a network for malicious
purposes
Rootkits
Hide presence and activities on a computer, operate at the OS level
Backdoors and Logic Bombs
Backdoors allow unauthorized access, logic bombs execute malicious
actions
Keyloggers
Record keystrokes, capture passwords or sensitive information
Spyware and Bloatware
Spyware monitors and gathers user/system information, bloatware
consumes resources without value