Cryptominer, Hijacks the resources of the host, often performed across botnets. ex: a PC is very sluggish resulted by a cryptominer hijacked the resources to support other's high end GPU, Spyware, Performs DNS redirection to spoofed sites, often paired with keylogger, Rootkits, Infects firmware code, uses an exploit to escalate privileges, Trojans, Packaged as useful application, used by attacker to conceal action., Viruses, Concealed in code of an executable pressures, replication required user interaction , Worm, Replicates between processes in system memory rather than infecting an executable file stored on a disk., Ransomware, A type of malware that tries to extort money from the victim, will display threatening messages, such as requiring Windows to be reactivated., Pop-up, The result of malware being installed on a system, This type causes pop-ups within the Windows OS or browser .
0%
Workstation Security
Share
Share
Share
by
Pianohagens
College
CS
I-edit ang Content
I-Print kini
Embed
Uban pa
Assignments
Leaderboard
Show more
Show less
Kini nga leaderboard naka-pribado. Pag-klik sa
Share
aron himuon kini nga publiko.
Kini nga leaderboard gi-disable sa tag-iya sa resource.
Kini nga leaderboard gi-disable tungod ang imong mga kapilian lahi ra sa tag-iya sa resource.
I-revert ang mga Kapilian
Ang
Match up
usa ka open-ended nga template. Dili kini makamugna ug mga marka sa leaderboard.
Kinahanglan mag log in
Visual style
Fonts
Subscription required
Mga Option
I-switch ang template
Ipakita tanan
Daghang mga format ang mugawas samtang gidula nimo ang activity.
)
Open results
Copy link
QR code
Mag-delete
I-restore ang gi-autosave:
?