Malware (Computing homework) Flashcards
I'ts homework.
Viruses
A computer virus is aprogram that makes copies of itself to programs you have installed on your computer and then damages your system.
Worms
Similer to a virus, a worm is a program that makes copies of itself and then spreads through a network, damaging the system as it goes along.
Trojans
This is a program that looks harmless and tricks you into running it on your computer . It then carries out its real task for example, displaying adverts on the desktop or installing unwanted toolbars.
Worms
Similer to a virus, a worm is a program that makes copies of itself and then spreads through a network, damaging the system as it goes along.
Trojans
This is a program that looks harmless and tricks you into running it on your computer . It then carries out its real task for
Worms
Similer to a virus, a worm is a program that makes copies of itself and then spreads through a network, damaging the system as it goes along.
Trojans
This is a program that looks harmless and tricks you into running it on your computer . It then carries out its real task for
Worms
Similer to a virus, a worm is a program that makes copies of itself and then spreads through a network, damaging the system as it goes along.
Trojans
This is a program that looks harmless and tricks you into running it on your computer . It then carries out its real task for
RAT
Aremote access trojan which gives control of your computer to the hacker.
Rootkits
The software that enables a hacker to get control of your computer.
Diallers
A malicious program designed to track and moniter the users keystrokes, often used to steal passwords, credit cards, details, etc…
Spyware
Spyware programs gather information about you from your computer. This can be personal information or information about what websites you have visted.
Adware
Adware Adware displays unwanted adverts on your computer without asking permission.
Browser exploits
A maliciouse code that t
RAT
Aremote access trojan which gives control of your computer to the hacker.
Rootkits
The software that enables a hacker to get control of your computer.
Diallers
A malicious program designed to track and moniter the users keystrokes, often used to steal passwords, credit cards, details, etc…
Spyware
Spyware programs gather information about you from your computer. This can be personal information or information about what websites you have visted.
Adware
Adware Adware displays unwanted adverts on your computer without asking permission.
Browser exploits
A malicious code that takes advantage of an internet browser vulnerability to make the browser do something you don’t want.
Operating systems exploits
A malicious code that takes advantage of a weakness in your operating system.
P2P Infection
Infected files which come from a file sharing website.
Phishing
Phishing is an attempt to get your personal information such as your bank account details by pretending to be, for example, a charity or claiming that you have won a cash prize. Its often carried out by email.
Identity theft
When people steal your personal details and pretend to be you, for example, buying online.
Hacking
When someone acceses a computer system by finding a way around security.
Denial of service attack
DoS attacks are an attempt to make a computer or network resource unavailable to it’s intended users.