Skab bedre lektioner hurtigere
Opret aktivitet
Log på
Tilmeld dig
Dansk
Hjem
Funktioner
Prislister
Hjem
Funktioner
Kontakt
Prislister
Log på
Tilmeld dig
Sprog
Min skole
Min profilside
Redigere personlige oplysninger
Sprog og placering
Log af
Català
Cebuano
Čeština
Dansk
Deutsch
Eesti keel
English
Español
Français
Hrvatski
Indonesia
Italiano
Latvian
Lietuvių
Magyar
Melayu
Nederlands
Norsk
Polski
Português
Română
Slovenčina
Slovenščina
Srpski
Suomi
Svenska
Tagalog
Türkçe
Vietnamese
ελληνικά
български
Русский
Српски
Українська
עִברִית
عربى
हिंदी
ગુજરાતી
ภาษาไทย
한국어
日本語
简体字
繁體字
Malware - Malicious software designed to infiltrate, damage, or gain unauthorized access to computer systems or networks, Virus - A type of malware that can replicate itself and spread to other files or systems, often causing harm or disrupting operations., Worm - A self-replicating malware that can spread across networks without human intervention, often exploiting vulnerabilities in operating systems or software, Trojan - A type of malware disguised as legitimate software, tricking users into executing it and allowing unauthorized access or control of their systems, Ransomware - Malware that encrypts files on a victim's system, demanding a ransom payment in exchange for the decryption key, Spyware - Malware that secretly gathers information about a user's activities, such as browsing habits or login credentials, and sends it to unauthorized third parties, Adware - Malware that displays unwanted advertisements or redirects users to advertising websites, often bundled with legitimate software, Keylogger - Malware that records keystrokes on a compromised system, capturing sensitive information like passwords, credit card numbers, or personal data., Botnet - A network of compromised computers, or "bots," controlled by a central command to carry out malicious activities, such as distributed denial-of-service (DDoS) attacks., Rootkit - Malware that hides its presence and grants unauthorized access to a compromised system, allowing attackers to control it while remaining undetected, Exploit - A piece of software or code that takes advantage of vulnerabilities or weaknesses in a system or software to gain unauthorized access or perform malicious actions., Phishing - A social engineering technique where attackers impersonate trustworthy entities, such as banks or organizations, to trick users into revealing sensitive information or downloading malware., Zero-day - A vulnerability or software flaw that is unknown to software developers or security experts, making it exploitable by attackers before a patch or fix is available., Backdoor - A hidden or undocumented method or vulnerability intentionally inserted into software to bypass normal authentication or security controls., Antivirus - Software designed to detect, prevent, and remove malware from computer systems by scanning files, monitoring system activity, and blocking suspicious behavior.,
0%
DayDayUp IT Course - Lesson 27 - Malware vocabulary
Del
af
Schooldaydayup
DayDayUp
English
English for IT
Mere
Rediger indhold
Trykke
Integrere
Tildelinger
Rangliste
Flash-kort
er en åben skabelon. Det genererer ikke resultater for en rangliste.
Log ind påkrævet
Visuel stil
Skrifttyper
Kræver abonnement
Indstillinger
Skift skabelon
Vis alle
Der vises flere formater, mens du afspiller aktiviteten.
Åbne resultater
Kopiér link
QR-kode
Slette
Gendan automatisk gemt:
?