malware

Cards (18)

  • Trojan horse is a type of malware that disguises itself as legitimate software to trick users into downloading and installing it.
  • Worm is a type of malware that spreads itself from one computer to another without any human interaction.
  • Malicious code is software that performs unauthorized actions on your computer.
  • Trojan horse programs are designed to appear harmless but actually contain hidden functions, such as stealing data or installing other malicious programs.
  • Spyware is a type of malware that collects information about the user's activities without their knowledge or consent, often used for advertising purposes.
  • Worms are self-replicating malware that consume network resources to spread to other systems.
  • Virus is a type of malware that replicates itself by attaching itself to other programs or files on the infected system.
  • Viruses can be spread through email attachments, infected websites, or downloaded files from the internet.
  • Ransomware is a type of malware that encrypts data on an infected device and demands payment in exchange for decryption.
  • Virus is a type of malware that replicates itself by attaching itself to other programs or files, causing damage to the system.
  • Blagging is used by hackers to encourage them to hand over personal infomation or bribe them for money with fake scenarios
  • Shouldering is where you look over someones shoulder at passwords or other sensitive information.
  • Phishing is sending emails to bribe money or personal details out of someone
  • Social engineering is the process of manipulating people into giving out personal information or performing actions that are not in their best interest
  • Malware can be spread through email attachments, downloading software from untrusted sources, clicking on links in phishing emails, using public Wi-Fi networks without proper security measures, and visiting compromised websites.
  • Miconfigured access rights are where companies provide access to data that people shouldnt have access to.
  • pharming redirects users to fraudulant websites without there knowladge
  • firewalls
    check what comes in and out of computers
    protect unautharized access