|
|
Created by Lyndsay Badding
over 2 years ago
|
|
| Question | Answer |
| Viruses | attach to files need human interaction |
| Worms | self-propagating consumes all resources can carry other types of malware as a payload |
| Trojans | hides inside seemingly legit software |
| RATs | can create a backdoor typically initiated though SPAM |
| Ransomware | demands ransom to gain access to the files they encrypted |
| Crypto-Malware | class of ransomware that uses victim machine's resources to mine for cryptocurrency |
| Rootkits | obtains access to kernel of OS may reside in firmware |
| Bots | infected computer under the control of a hacker |
| Botnets | network of bots typically used to send large amounts of SPAM or create a DDoS controlled with C2 |
| Logic Bombs | activates at a specified time or when a specified action/event takes place |
| Spyware | records and sends out data and/or keystrokes can use screenshots and/or webcam/microphone |
| Adware | many ads, but not real websites |
| Keyloggers | records keystrokes |
Want to create your own Flashcards for free with GoConqr? Learn more.