Other Malware Types 2.4 Flashcards
1
Q
[…] track all of your key strokes that you type into your system and sends it to the attacker. They’re also used to capture information saved to the clipboard and take screenshots
A
Keyloggers
2
Q
A […] malware waits for a predefined event before executing. It could be time/date or a particular user logging in that triggers it
A
Logic Bomb
3
Q
Logic bombs are difficult to recognize, due to them not having any predefined […] associated with it. Every logic bomb is unique
A
Signatures
4
Q
A […] hides in the kernel of a Linux operating system and modifies core files. It is invisible to the OS and most antivirus utilities
A
Root Kit