Malware Part 1

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

One key feature of malware

It can work jointly with other malware types

Metasploit

A penetration-testing tool that can be used to help protect a system or to break into one.

Trojan

A program disguised as a harmless application that actually produces harmful results.

Keylogger

A small hardware device or a program that monitors search keystroke a user types on the computer's keyboard.

IP address

A number that uniquely identifies each computer or device connected to the Internet.

Viruses and worms

Affect a system by slowing down the system

Backdoor

An unrecognized entry into a computer or system

ransomware attack

Files are encrypted and a ransom is demanded to regain access

Rootkits

Hard to discover and remove because they modify the core of an operating system

Malware

Software that is designed to intentionally cause harm to a device, server, or network

anti-virus software

The best way to counteract a computer virus

Firewall

The best way to help prevent a system from a worm attack

Keep a backup

The best way to protect yourself against ransomware

Email Attachments

The most common way that malware is delivered to a system

Malware Database

Tool used to examine malware and see their impact on a system.

Software keylogger

Type of keylogger that does not require a connection between a keyboard and a computer

Remote Access Trojan (RAT)

Type of malware gives attackers remote access to a device or system and usually goes undetected

Most common Malware vulnerability

Using old versions of software and OS

networks

Worms will infect other computers by moving through

a file, document, or program

A computer virus attaches to ______ in order to execute malicious code

Keystroke

A key used on a keyboard

Worm

Malware type can replicate itself without the help of a host system or human interaction

Virus

Malware type can self-replicate with the assistance of a host system

Cryptomalware

Ransomware that encrypts data and asks for cryptocurrency for the key

Root

Refers to the admin account on Linux


Set pelajaran terkait

ch 16 assessing eyes, Cranial nerves nursing assessment, RANGE OF MOTION FOR DIARTHRODIAL JOINTS

View Set

N C L E X Male Reproductive Problems

View Set

Adjectives (1) - The Enormous Crocodile by Roald Dahl

View Set