Create better lessons quicker
Create Activity
Log In
Sign Up
English
Home
Features
Price Plans
Home
Features
Contact
Price Plans
Log In
Sign Up
Language
My school
My Profile Page
Edit personal details
Language and Location
Log Out
Català
Cebuano
Čeština
Dansk
Deutsch
Eesti keel
English
Español
Français
Hrvatski
Indonesia
Italiano
Latvian
Lietuvių
Magyar
Melayu
Nederlands
Norsk
Polski
Português
Română
Slovenčina
Slovenščina
Srpski
Suomi
Svenska
Tagalog
Türkçe
Vietnamese
ελληνικά
български
Русский
Српски
Українська
עִברִית
عربى
हिंदी
ગુજરાતી
ภาษาไทย
한국어
日本語
简体字
繁體字
Malware - Malicious software designed to infiltrate, damage, or gain unauthorized access to computer systems or networks, Virus - A type of malware that can replicate itself and spread to other files or systems, often causing harm or disrupting operations., Worm - A self-replicating malware that can spread across networks without human intervention, often exploiting vulnerabilities in operating systems or software, Trojan - A type of malware disguised as legitimate software, tricking users into executing it and allowing unauthorized access or control of their systems, Ransomware - Malware that encrypts files on a victim's system, demanding a ransom payment in exchange for the decryption key, Spyware - Malware that secretly gathers information about a user's activities, such as browsing habits or login credentials, and sends it to unauthorized third parties, Adware - Malware that displays unwanted advertisements or redirects users to advertising websites, often bundled with legitimate software, Keylogger - Malware that records keystrokes on a compromised system, capturing sensitive information like passwords, credit card numbers, or personal data., Botnet - A network of compromised computers, or "bots," controlled by a central command to carry out malicious activities, such as distributed denial-of-service (DDoS) attacks., Rootkit - Malware that hides its presence and grants unauthorized access to a compromised system, allowing attackers to control it while remaining undetected, Exploit - A piece of software or code that takes advantage of vulnerabilities or weaknesses in a system or software to gain unauthorized access or perform malicious actions., Phishing - A social engineering technique where attackers impersonate trustworthy entities, such as banks or organizations, to trick users into revealing sensitive information or downloading malware., Zero-day - A vulnerability or software flaw that is unknown to software developers or security experts, making it exploitable by attackers before a patch or fix is available., Backdoor - A hidden or undocumented method or vulnerability intentionally inserted into software to bypass normal authentication or security controls., Antivirus - Software designed to detect, prevent, and remove malware from computer systems by scanning files, monitoring system activity, and blocking suspicious behavior.,
0%
DayDayUp IT Course - Lesson 27 - Malware vocabulary
Share
by
Schooldaydayup
DayDayUp
English
English for IT
More
Edit Content
Print
Embed
Assignments
Leaderboard
Flash cards
is an open-ended template. It does not generate scores for a leaderboard.
Log in required
Visual style
Fonts
Subscription required
Options
Switch template
Show all
More formats will appear as you play the activity.
Open results
Copy link
QR code
Delete
Continue editing:
?