Malware - Software designed to take over or damage a computer without the user's knowledge or approval., Virus - A program that attempts to damage a computer system and replicate itself to other computer systems., Worm - A self-replicating malware program., Trojan Horse - A malicious program that is disguised as legitimate or desirable software., Zombie - A computer that is infected with malware and is controlled by a command and control center called a zombie master., Botnet - A group of zombie computers that are commanded from a central control infrastructure., Rootkit - A set of programs that allows attackers to maintain hidden, administrator-level access to a computer., Logic Bomb - Malware designed to execute only under predefined conditions. It is dormant until the predefined condition is met., Spyware - Software installed without the user's consent or knowledge and is designed to intercept or take partial control of the user's computer., Adware - Malware that monitors a user's personal preferences and sends pop-up ads that match those preferences., Ransomware - Malware that denies access to a computer system until the user pays a ransom., Scareware - A scam to fool a user into thinking there is some form of malware on the system., Crimeware - Malware designed to perpetrate identity theft. It allows a hacker access to online accounts at financial services, such as banks and online retailers., Crypto-Malware - Ransomware that encrypts files until a ransom is paid., Remote Access Trojan (RAT) - Malware that includes a back door to allow a hacker administrative control over the target computer., Hacker - A person who commits crimes through gaining unauthorized access to computer systems., Cracker - A person actively engaged in developing and distributing worms, Trojans, and viruses; engaging in probing and reconnaissance activities; creating toolkits so that others can hack known vulnerabilities; and/or cracking protective measures., Script Kiddie - A less-skilled hacker who often relies on automated tools or scripts written by crackers to scan systems and exploit weaknesses., Potentially Unwanted Program (PUP) - A PUP is a software inadvertently installed that contains adware, installs toolbars, or has other objectives., Fileless virus - A fileless virus uses legitimate programs to infect a computer.,
0%
Security+: Malware Types
Поделиться
от
Terry22
9th Grade
10th Grade
11th Grade
12th Grade
Vocational / Technical
Higher Education
CompTIA
Computing
CompTIA
Cybersecurity
Security
Редактировать контент
Внедрить
Больше
Таблица лидеров
Показать больше
Показать меньше
Эта таблица лидеров в настоящее время является частной. Нажмите
Поделиться
, чтобы сделать ее общедоступной.
Эта таблица лидеров была отключена владельцем ресурса.
Эта таблица лидеров отключена, так как у вас и у владельца ресурса разные значения параметров.
Варианты отмены изменения
Сопоставить
— это открытый шаблон. Он не создает баллы для таблицы лидеров.
Требуется вход в систему
Визуальный стиль
Шрифты
Требуется подписка
Параметры
Переключить шаблон
Показать все
Дополнительные форматы будут отображаться при выполнении занятия.
Открыть результаты
Скопировать ссылку
QR-код
Удалить
Восстановить автоматически сохраненное:
?