Spyware/malware

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Trojan Horse

A computer program is either hidden inside another program or that masquerades as something it is not in order to trick potential users into running it. For example a program that appears to be a game or image file but in reality performs some other function. (A malicious program that hides within or looks like a legitimate program.)

Computer Worm

A malicious program designed to spread rapidly to a large number of computers by sending copies of itself to other computers.

Hacker

A person who secretly gains access to computers and files without permission.

Virus

A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data

Adware

A software program that delivers advertising content in a manner that is unexpected and unwanted by the user.

Spyware

Any software application that covertly gathers information about a user's Internet usage and activity and then exploits this information by sending adware and pop-up ads similar in nature to the user's Internet usage history. (it's a type of malware)

Browser HiJaker

Browser hijacking is the modification of a web browser's settings by malware, spyware or a virus. The term "hijacking" is used as the changes are performed without the user's permission. A browser hijacker may replace the existing home page, error page, or search page with its own

EULA

End-User License Agreement (EULA) is a document associated with a standalone software program which explains the legal regulations for using the software.

Keystroke Logger

Keystroke logging, often referred to as keylogging or Keyboard Capturing, is the action of recording (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored

Riley

Parise

Malware

software designed to infiltrate or damage a computer system without the user's informed consent

Phishing

the activity of defrauding an online account holder of financial information by posing as a legitimate company.

Spam

unwanted e-mail (usually of a commercial nature sent out in bulk)


Set pelajaran terkait

1.0 Attacks threats and vulnerabilities 24%

View Set

The list of the most popular web browsers

View Set

Introduction to Networks (Version 6.00) - ITN Chapter 10 Exam

View Set

Chemistry II, CHM102 MasteringChemistry Ch. 15, 14.2 Acid-base Properties of Water, ALL KNEWTON TESTS, chemistry quiz 1, Gen Chem 2 Acid-Base Review, Fundamentals of Equilibrium, Le Chatelier's Acids Bases Intro, Knewton's Alta Module 14, CH 13 HW 5...

View Set

Module 15 Plant Structure and Growth

View Set