tRojans

Backdoor
are often used to unite a group of victim computers to form a botnet or zombie network that can be used for criminal purposes.
1 of 10
Exploit
are programs that contain data or code that takes advantage of a vulnerability within application software that’s running on your computer.
2 of 10
Rootkit
are designed to conceal certain objects or activities in your system
3 of 10
Trojan-Banker
are designed to steal your account data for online banking systems
4 of 10
Trojan-Downloader
can download and install new versions of malicious programs onto your computer
5 of 10
Trojan-GameThief
steals user account information from online gamers.
6 of 10
Trojan-Ransom
so that your computer doesn’t run correctly or you can no longer use specific data
7 of 10
Trojan-SMS
sending text messages from your mobile device to premium rate phone numbers.
8 of 10
Trojan-Spy
can spy on how you’re using your computer
9 of 10
Trojan-Mailfinder
These programs can harvest email addresses from your computer.
10 of 10

Other cards in this set

Card 2

Front

Exploit

Back

are programs that contain data or code that takes advantage of a vulnerability within application software that’s running on your computer.

Card 3

Front

Rootkit

Back

Preview of the front of card 3

Card 4

Front

Trojan-Banker

Back

Preview of the front of card 4

Card 5

Front

Trojan-Downloader

Back

Preview of the front of card 5
View more cards

Comments

No comments have yet been made

Similar Computing resources:

See all Computing resources »See all Databases resources »