Module 2 Flashcards
Malware
Malware
A malicious software program designed to harm, steal, or damage data or systems.
Virus
A software that infects other programs and spreads when a host program is executed.
Worm
A program that seeks out more machines to infect and spreads without user intervention.
Trojan Horse
A program containing harmful hidden code designed to mislead users about its true intent.
Logic Bomb
A piece of malicious code that triggers under specific conditions, like a predefined time.
Ransomware
A type of malware that encrypts a user’s data and demands payment to recover the data.
Keylogger
A program that records keystrokes to steal sensitive information, like usernames and passwords.
Spyware
Software that monitors user activity, such as browser history, without the user’s consent.
Rootkit
A set of hidden programs installed on a system to maintain covert access, often with admin privileges.
Backdoor
A secret entry point into a program that allows an attacker to bypass security measures.
Scareware
Malicious software that scares users into installing or paying for a program to fix non-existent problems.
Adware
Malware that causes pop-up ads or redirects browsers to commercial websites.
Botnet
A network of infected computers used to launch coordinated attacks.
Blended Malware
Malware that uses multiple propagation methods and payloads to increase spread and effectiveness.
Advanced Persistent Threat (APT)
A state-sponsored, well-resourced, and persistent attack using a variety of intrusion techniques.
Attack Kit
A set of tools used to automatically generate new malware using various propagation methods.
Social Engineering
Tricking users into compromising their own systems, often through spam or deceptive emails.
Sandboxing
Running potentially malicious code in a controlled virtual environment to monitor its behavior.
Perimeter Scanning
The process of scanning network traffic for malware at the perimeter of a network.