Malware Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Malware

A

Short for malicious software, this is programming or code that is used to disrupt computers by:
● Gathering sensitive information
● Gaining access to private computer systems
● Displaying unwanted advertising
● Distributing the performance of a computer or network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Trojan

A

A malicious computer program that tricks users into willingly running it is called a ‘Trojan horse’ or simply a ‘Trojan’. They can be delivered via internet downloads, infected USBs, or email attachments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Zombie

A

A computer connected to the internet that has been compromised by a hacker, computer virus, or Trojan horse program and can be used to perform malicious tasks under remote direction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data breach/data interception

A

A data breach is a security incident in which sensitive, protected, or confidential data is copied, transmitted, viewed, stolen, or used by an individual who is not authorised to do so.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Brute force attack

A

This type of attack can occur when an attacker systematically submits guessed passwords with the hope of eventually guessing correctly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Virus

A

Malware that usually embeds itself into existing software on a device and then, once that software is run, spreads to other executable files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Worm

A

While also self-replicating, a worm does not need to infect an existing program. Worms are able to spread very rapidly, infecting large numbers of machines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Ransomware

A

This type of Trojan can modify data on a computer or device so that it doesn’t run correctly or so that users can no longer use specific data. The criminal will only restore the computer’s performance, or unblock data, after the victim has paid them the ransom money they demand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Spyware

A

Programs that can spy on how a user makes use of their computer or device, for example by tracking the data entered via a keyboard, taking screenshots, or getting a list of running applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Adware

A

Software that contains advertisements embedded in the application. It is not always a bad thing and is considered a legitimate alternative offered to consumers who do not wish to pay for software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Exploit

A

Code that takes advantage of a security vulnerability in an operating system, application, or any other software code, including application plug-ins or software libraries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly