Malware - Software designed to take over or damage a computer without the user's knowledge or approval., Virus - A program that attempts to damage a computer system by attaching to a host file and replicating itself to other computer systems., Worm - A self-replicating malware program., Trojan Horse - A malicious program that is disguised as legitimate or desirable software., Botnet - A group of zombie computers that are commanded through a backdoor program., Rootkit - A set of programs that allows attackers to maintain hidden, administrator-level access to a computer., Logic Bomb - Malware designed to execute only under predefined conditions. It is dormant until the predefined condition is met., Spyware - Software installed without the user's consent or knowledge and is designed to intercept or take partial control of the user's computer., Adware - Malware that monitors a user's personal preferences and sends pop-up ads that match those preferences., Ransomware - Malware that denies access to a computer system until the user pays a ransom., Hacker - A person who commits crimes through gaining unauthorized access to computer systems., Potentially Unwanted Program (PUP) - A PUP is a software inadvertently installed that contains adware, installs toolbars, or has other objectives., Advanced Persistent Threat (APT) - An attack that provides multiple ways in and out and can be used for an extended period of time., Spam - Unsolicited commercial email.,

Intro to Cybersecurity 1.2.1: Malware Types

Leaderboard

Visual style

Options

Switch template

Continue editing: ?