Malware

?
Gathers information on the user it has infected, secretly sending it away to third-party sources – this may be through the use of keyloggers, which get information from what you type, such as passwords.
Spyware
1 of 7
Used to get unauthorised remote administrator access to a computer or network. They typically spread by hiding in software that appears to offer legitimate functionality. This can then be used to steal data or hide other malware within the system.
Rootkits
2 of 7
Modify existing programs with malicious code and constantly replicates itself throughout a computer. They usually cause the corruption of data and applications, system failure & take up storage space or processing power.
Viruses
3 of 7
Perform a similar function to viruses. However, they can replicate themselves through a network to spread to other computers, rather than through infecting files that are spread.
Worms
4 of 7
Displays unwanted advertisements used to generate revenue, sometimes obstructing the user through the use of pop-ups that don’t disappear when you close them.
Adware
5 of 7
Malicious code that hides within a seemingly legitimate program. Typically, users are misled and download the it themselves by thinking it’s a program they would like to use.
Trojans
6 of 7
Prevents you from accessing your computer system, often by encrypting the storage devices, and demands a sum of money to be paid in order to gain access back.
Ransomware
7 of 7

Other cards in this set

Card 2

Front

Used to get unauthorised remote administrator access to a computer or network. They typically spread by hiding in software that appears to offer legitimate functionality. This can then be used to steal data or hide other malware within the system.

Back

Rootkits

Card 3

Front

Modify existing programs with malicious code and constantly replicates itself throughout a computer. They usually cause the corruption of data and applications, system failure & take up storage space or processing power.

Back

Preview of the front of card 3

Card 4

Front

Perform a similar function to viruses. However, they can replicate themselves through a network to spread to other computers, rather than through infecting files that are spread.

Back

Preview of the front of card 4

Card 5

Front

Displays unwanted advertisements used to generate revenue, sometimes obstructing the user through the use of pop-ups that don’t disappear when you close them.

Back

Preview of the front of card 5
View more cards

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Malware resources »