Trojan - A type of malware disguised as legitimate software, allowing attackers to gain unauthorized access Can install backdoors, keyloggers, or other malicious tools. to a system., Rootkit - malware that hides its presence and gives attackers administrative access to a system. Can modify system files, registry entries, and boot sectors, Virus - replicates itself by attaching to other programs or files. Can cause harm by overwriting system files, deleting data, or crashing the system. , Spyware - monitors user activity, often for advertising or financial gain. Can track keystrokes, capture screenshots, and steal sensitive information. , Ransomware - encrypts files or locks systems, demanding payment in exchange for the decryption key. Can spread through phishing emails, infected software, or exploited vulnerabilities. , Keylogger - records user keystrokes, often for malicious purposes such as stealing passwords or credit card information., Boot sector virus - infects the boot sector of a hard drive or solid-state drive. Can cause system crashes, data corruption, or overwrite system files., Cryptominers - uses a victim’s computer resources to mine cryptocurrency without their consent. Can consume system resources, generate excessive heat, and prolong battery life. ,
0%
a+1102 2.3 - Malware
Share
by
Thedrizzzle86
Higher Education
Computing
information technology
Edit Content
Print
Embed
More
Assignments
Leaderboard
Show more
Show less
This leaderboard is currently private. Click
Share
to make it public.
This leaderboard has been disabled by the resource owner.
This leaderboard is disabled as your options are different to the resource owner.
Revert Options
Match up
is an open-ended template. It does not generate scores for a leaderboard.
Log in required
Visual style
Fonts
Subscription required
Options
Switch template
Show all
More formats will appear as you play the activity.
Open results
Copy link
QR code
Delete
Continue editing:
?