Malware - A broad term for any software intentionally designed to cause damage or harm to a computer system., Virus - A program that attaches itself to a legitimate program or file and spreads to other files or systems., Worm - A self-replicating program that spreads without needing a host file, usually through networks, Trojan Horse (Trojan) - malicious software that disguises itself as legitimate software to trick users into installing it, then performs unauthorized and harmful actions on their device, such as stealing data, damaging the system, or creating a backdoor for further intrusion., Spyware - Software that secretly collects information about users, often for malicious purposes., Adware - Software that automatically displays or downloads unwanted ads, sometimes bundled with other programs., Ransomware - Malicious software that encrypts the victim’s files and demands payment for the decryption key., Rootkit - Software designed to gain unauthorized access to a system, often with the intent of hiding other types of malware., Keylogger - A type of spyware that records every keystroke made by a user, often used for stealing sensitive information like passwords., Backdoor - A secret method for bypassing normal authentication to access a system, often installed by a Trojan or virus., Botnet - A network of infected devices (often called "bots") that can be controlled remotely to launch attacks (like DDoS)., Fileless Malware - Malware that operates without being stored on disk, often living in memory to avoid detection., Downloader - Malware designed to download and install other malicious software on a compromised system., Macro Virus - A virus embedded in the macros of documents like Word or Excel files, which activates when the document is opened., Drive-by Download - Malware that is downloaded automatically when a user visits a compromised or malicious website., Phishing - A method of tricking users into giving up sensitive information like passwords or credit card numbers., Spear Phishing - A more targeted form of phishing aimed at specific individuals or organizations., Zero Day - A vulnerability that is exploited by attackers before it is discovered or patched by the software vendor., Polymorphic Malware - Malware that changes its code to avoid detection by antivirus software., Dropper - A type of malware that installs other malware files onto your device. Unlike a downloader, this type doesn't have to connect to the internet to drop malicious files., Obfuscator - A type of malware that hides its code and purpose, making it more difficult for security software to detect or remove., Password Stealer - A type of malware that gathers your personal information, such as usernames and passwords. It often works along with a key logger, which collects and sends information about the keys you press and websites you visit., Potentially Unwanted Program - Software or an app that you don’t explicitly want on your device which are usually bundled with freeware and often installs without your permission., File Hash - a unique, fixed-length string of characters that acts as a digital fingerprint for a file, generated by a one-way mathematical function called a hashing algorithm., Masquerading - Attackers often rename malicious files to make them look like legitimate ones. This technique helps them avoid detection by security tools that may be looking for specific process names.,
0%
Malware Analysis: Key Terms
Compartilhar
Compartilhar
Compartilhar
de
Cpittma6
Editar conteúdo
Imprimir
Incorporar
Mais
Atribuições
Ranking
Mostrar mais
Mostrar menos
Atualmente, este ranking é particular. Clique em
Compartilhar
para torná-lo público.
Este ranking foi desativado pelo proprietário do recurso.
Este ranking está desativado, pois suas opções e as do proprietário do recurso são diferentes.
Reverter opções
Associação
é um modelo aberto. Ele não gera pontuações para um ranking.
Login necessário
Estilo visual
Fontes
Assinatura necessária
Opções
Alterar modelo
Mostrar todos
Mais formatos serão exibidos à medida que você executar a atividade.
Resultados em aberto
Copiar link
Código QR
Excluir
Restaurar arquivo salvo automaticamente:
?