Malware Flashcards
Malware
Malware comes from the word malicious and software. It is one collective term given to software that is harmful to a computer system or computer network.
Operating System Exploits
If you have an operating system exploit it makes your computer more vulnerable to hacks or other dangerous things.
Phishing
Phishing is when you go on a website or click on an advert that looks like the real thing but it is actually someone trying to harm your computer or take your details.
Worm
A worm is a virus the keeps on multiplying itself and it can not be deleted.
Trojan
A trojan is a virus that disguises itself as a harmless peice of software. Once it is on your computer it then begins its attack. Sometimes it just adds unwanted adverts or toolbars.
P2P Infection
This kind of infection is when you get a virus from a file you downloaded that someone else put on the website.
Identity Theft
This is when people steal your details such as bank details and they buy things online.
Keylogging
Keylogging is when someone uses a special peice of malware that keeps a record of every key you press. It lets then steal your passwords for account.
Scareware
Scareware is a fake security system that tells you that your computer has viruses on it so you buy their security system.
RAT
RAT stands for remote access trojan. A remote access trojan is a virus that a hacker controls.
Dialler
A dialler is a peice of malware that phones very expensive phone numbers just to waste your money,
Spyware
Spyware is a peice of malware that lets someone collect information about you. The information is usually sent to a person or a group of people so they can do various things with it.
Browser Expolit
A browser exploit is a peice of malware that takes advantage of a flaw in the browser software. Sometimes they change the results of a search engine to go onto websites that give them money but other times it can be harmfull to the browser.
Virus
A virus is a peice of malware that attaches itself to a larger and harmless peice of softwareand then it multiplies itself. They can be hard to detect.
Rootkit
A rootkit lets a hacker take control of your computer.