Threats Attacks Vulnerabilities Flashcards
Unsolicited and unwanted malicious program
Viruses
A malicious program that encrypts programs and files on the computer in order to extort money from the user.
Crypto-malware
Denies access to a computer system or data until a ransom is paid. Can be spread through a phishing email or unknowingly infected website.
Ransomware
A self-contained infection that can spread itself through networks, emails, and messages.
Worm
A form of malware that pretends to be a harmless application.
Trojan
A backdoor program that allows full remote access to a system.
Rootkit
A malicious program that saves all of the keystrokes of the infected machine.
Keylogger
A program that produces ads and pop ups using your browser, may replace the original browser and produce fake ads to remove the adware in order to download more malware.
Adware
Software that installs itself to spy on the infected machine, sends the stolen information over the internet back to the host machine.
Spyware
AI that when inside an infected machine performs specific actions as part of a larger entity known as a botnet.
Bots
A remotely operated Trojan
Remote Access Trojan
RAT
Malicious program that lies dormant until a specific date or event occurs.
Logic bomb
Allows for full access to a system remotely.
Backdoor