Malware - A broad term for any software intentionally designed to cause damage or harm to a computer system., Virus - A program that attaches itself to a legitimate program or file and spreads to other files or systems., Worm - A self-replicating program that spreads without needing a host file, usually through networks, Trojan Horse (Trojan) - malicious software that disguises itself as legitimate software to trick users into installing it, then performs unauthorized and harmful actions on their device, such as stealing data, damaging the system, or creating a backdoor for further intrusion., Spyware - Software that secretly collects information about users, often for malicious purposes., Adware - Software that automatically displays or downloads unwanted ads, sometimes bundled with other programs., Ransomware - Malicious software that encrypts the victim’s files and demands payment for the decryption key., Rootkit - Software designed to gain unauthorized access to a system, often with the intent of hiding other types of malware., Keylogger - A type of spyware that records every keystroke made by a user, often used for stealing sensitive information like passwords., Backdoor - A secret method for bypassing normal authentication to access a system, often installed by a Trojan or virus., Botnet - A network of infected devices (often called "bots") that can be controlled remotely to launch attacks (like DDoS)., Fileless Malware - Malware that operates without being stored on disk, often living in memory to avoid detection., Downloader - Malware designed to download and install other malicious software on a compromised system., Macro Virus - A virus embedded in the macros of documents like Word or Excel files, which activates when the document is opened., Drive-by Download - Malware that is downloaded automatically when a user visits a compromised or malicious website., Phishing - A method of tricking users into giving up sensitive information like passwords or credit card numbers., Spear Phishing - A more targeted form of phishing aimed at specific individuals or organizations., Zero Day - A vulnerability that is exploited by attackers before it is discovered or patched by the software vendor., Polymorphic Malware - Malware that changes its code to avoid detection by antivirus software., Dropper - A type of malware that installs other malware files onto your device. Unlike a downloader, this type doesn't have to connect to the internet to drop malicious files., Obfuscator - A type of malware that hides its code and purpose, making it more difficult for security software to detect or remove., Password Stealer - A type of malware that gathers your personal information, such as usernames and passwords. It often works along with a key logger, which collects and sends information about the keys you press and websites you visit., Potentially Unwanted Program - Software or an app that you don’t explicitly want on your device which are usually bundled with freeware and often installs without your permission., File Hash - a unique, fixed-length string of characters that acts as a digital fingerprint for a file, generated by a one-way mathematical function called a hashing algorithm., Masquerading - Attackers often rename malicious files to make them look like legitimate ones. This technique helps them avoid detection by security tools that may be looking for specific process names.,
0%
Malware Analysis: Key Terms
공유
공유
공유
만든이
Cpittma6
콘텐츠 편집
인쇄
퍼가기
더보기
할당
순위표
더 보기
접기
이 순위표는 현재 비공개입니다.
공유
를 클릭하여 공개할 수 있습니다.
자료 소유자가 이 순위표를 비활성화했습니다.
옵션이 자료 소유자와 다르기 때문에 이 순위표가 비활성화됩니다.
옵션 되돌리기
매치업
(은)는 개방형 템플릿입니다. 순위표에 올라가는 점수를 산출하지 않습니다.
로그인이 필요합니다
비주얼 스타일
글꼴
구독 필요
옵션
템플릿 전환하기
모두 표시
액티비티를 플레이할 때 더 많은 포맷이 나타납니다.
결과 열기
링크 복사
QR 코드
삭제
자동 저장된
게임을 복구할까요?