Malware (Computing homework) Flashcards

I'ts homework.

1
Q

Viruses

A

A computer virus is aprogram that makes copies of itself to programs you have installed on your computer and then damages your system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Worms

A

Similer to a virus, a worm is a program that makes copies of itself and then spreads through a network, damaging the system as it goes along.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Trojans

A

This is a program that looks harmless and tricks you into running it on your computer . It then carries out its real task for example, displaying adverts on the desktop or installing unwanted toolbars.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Worms

A

Similer to a virus, a worm is a program that makes copies of itself and then spreads through a network, damaging the system as it goes along.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Trojans

A

This is a program that looks harmless and tricks you into running it on your computer . It then carries out its real task for

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Worms

A

Similer to a virus, a worm is a program that makes copies of itself and then spreads through a network, damaging the system as it goes along.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Trojans

A

This is a program that looks harmless and tricks you into running it on your computer . It then carries out its real task for

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Worms

A

Similer to a virus, a worm is a program that makes copies of itself and then spreads through a network, damaging the system as it goes along.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Trojans

A

This is a program that looks harmless and tricks you into running it on your computer . It then carries out its real task for

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

RAT

A

Aremote access trojan which gives control of your computer to the hacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Rootkits

A

The software that enables a hacker to get control of your computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Diallers

A

A malicious program designed to track and moniter the users keystrokes, often used to steal passwords, credit cards, details, etc…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Spyware

A

Spyware programs gather information about you from your computer. This can be personal information or information about what websites you have visted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Adware

A

Adware Adware displays unwanted adverts on your computer without asking permission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Browser exploits

A

A maliciouse code that t

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

RAT

A

Aremote access trojan which gives control of your computer to the hacker.

17
Q

Rootkits

A

The software that enables a hacker to get control of your computer.

18
Q

Diallers

A

A malicious program designed to track and moniter the users keystrokes, often used to steal passwords, credit cards, details, etc…

19
Q

Spyware

A

Spyware programs gather information about you from your computer. This can be personal information or information about what websites you have visted.

20
Q

Adware

A

Adware Adware displays unwanted adverts on your computer without asking permission.

21
Q

Browser exploits

A

A malicious code that takes advantage of an internet browser vulnerability to make the browser do something you don’t want.

22
Q

Operating systems exploits

A

A malicious code that takes advantage of a weakness in your operating system.

23
Q

P2P Infection

A

Infected files which come from a file sharing website.

24
Q

Phishing

A

Phishing is an attempt to get your personal information such as your bank account details by pretending to be, for example, a charity or claiming that you have won a cash prize. Its often carried out by email.

25
Identity theft
When people steal your personal details and pretend to be you, for example, buying online.
26
Hacking
When someone acceses a computer system by finding a way around security.
27
Denial of service attack
DoS attacks are an attempt to make a computer or network resource unavailable to it's intended users.