Chapter 3 Flashcards
Malware
Software that is intentionally designed to cause harm to systems and devices, networks, or users.
Ransomware
Malware that takes over a computer and then demands a ransom.
Trojans
Malware that is typically disguised as legitimate software.
Worms
Malware that spreads through a system using various interfaces.
Rootkits
Malware that is designed to allow attackers to access a system through a backdoor.
Backdoors
Methods or tools that provide access that bypasses normal authentication and authorization procedures.
Bots
Remotely controlled systems or devices that have a malware infection.
Keyloggers
Programs that capture keystrokes from keyboards.
Logic bombs
Functions or code that are placed inside other programs that will activate when set conditions are met.
Virus
Malicious programs that self-copy and self-replicate.
Spyware
Malware that is designed to obtain information about an individual, organization, or system.
PUP (Potentially Unwanted Program)
Programs that may not be wanted by the user but are not as dangerous as other types of malware.