Malware - Software designed to take over or damage a computer without the user's knowledge or approval., Virus - A program that attempts to damage a computer system and replicate itself to other computer systems., Worm - A self-replicating malware program., Trojan Horse - A malicious program that is disguised as legitimate or desirable software., Zombie - A computer that is infected with malware and is controlled by a command and control center called a zombie master., Botnet - A group of zombie computers that are commanded from a central control infrastructure., Rootkit - A set of programs that allows attackers to maintain hidden, administrator-level access to a computer., Logic Bomb - Malware designed to execute only under predefined conditions. It is dormant until the predefined condition is met., Spyware - Software installed without the user's consent or knowledge and is designed to intercept or take partial control of the user's computer., Adware - Malware that monitors a user's personal preferences and sends pop-up ads that match those preferences., Ransomware - Malware that denies access to a computer system until the user pays a ransom., Scareware - A scam to fool a user into thinking there is some form of malware on the system., Crimeware - Malware designed to perpetrate identity theft. It allows a hacker access to online accounts at financial services, such as banks and online retailers., Crypto-Malware - Ransomware that encrypts files until a ransom is paid., Remote Access Trojan (RAT) - Malware that includes a back door to allow a hacker administrative control over the target computer., Hacker - A person who commits crimes through gaining unauthorized access to computer systems., Cracker - A person actively engaged in developing and distributing worms, Trojans, and viruses; engaging in probing and reconnaissance activities; creating toolkits so that others can hack known vulnerabilities; and/or cracking protective measures., Script Kiddie - A less-skilled hacker who often relies on automated tools or scripts written by crackers to scan systems and exploit weaknesses., Potentially Unwanted Program (PUP) - A PUP is a software inadvertently installed that contains adware, installs toolbars, or has other objectives., Fileless virus - A fileless virus uses legitimate programs to infect a computer.,
0%
Security+: Malware Types
Поделиться
Поделиться
Поделиться
от
Terry22
G9
G10
G11
G12
CTE
College
CompTIA
CS
CompTIA
Cybersecurity
Security
Редактировать контент
Печать
Внедрить
Больше
Задания
Таблица лидеров
Показать больше
Показать меньше
Эта таблица лидеров в настоящее время является частной. Нажмите
Поделиться
, чтобы сделать ее общедоступной.
Эта таблица лидеров была отключена владельцем ресурса.
Эта таблица лидеров отключена, так как у вас и у владельца ресурса разные значения параметров.
Варианты отмены изменения
Сопоставить
— это открытый шаблон. Он не создает баллы для таблицы лидеров.
Требуется вход в систему
Визуальный стиль
Шрифты
Требуется подписка
Параметры
Переключить шаблон
Показать все
Дополнительные форматы будут отображаться при выполнении занятия.
Открыть результаты
Скопировать ссылку
QR-код
Удалить
Восстановить автоматически сохраненное:
?