Java Games: Flashcards, matching, concentration, and word search.

Maleware & Viruses

AB
MalwareShort for malicious software, it is code or software that is specifically designed to damage, disrupt, steal, or in general inflict some other “bad” or illegitimate action on data, hosts, or networks.
VirusA type of malware that copies itself by infecting other files, just as viruses in the real world infect biological cells and use those biological cells to reproduce copies of themselves. NOTE: It requires human interaction or someone to activate it.
WormThis program is similar to a virus, but it spreads a different way. Rather than infecting files and relying on human activity to move those files around and run them on different systems, it spreads over computer networks on its own accord.
Trojan HorseThis program is a type of malware that disguises itself as a legitimate file. When you download and run the program, the program will run in the background, allowing third-parties to access your computer. It can do this for any number of reasons — to monitor activity on your computer, or to join your computer to a botnet. This program may also be used to open the floodgates and download many other types of malware onto your computer.
SpywareThis program is a type of malicious software that spies on you without your knowledge. It collects a variety of different types of data, depending on the piece of software.
AdwareThis often comes along with spyware. It’s any type of software that displays advertising on your computer. Programs that display advertisements inside the program itself aren’t generally classified as malware. The kind of program that’s particularly malicious is the kind that abuses its access to your system to display ads when it shouldn’t. For example, a piece of harmful program may cause pop-up advertisements to appear on your computer when you’re not doing anything else. Or, it may inject additional advertising into other web pages as you browse the web.
KeyloggerA type of malware that runs in the background, recording every key stroke you make. These keystrokes can include usernames, passwords, credit card numbers, and other sensitive data. The program then, most likely, uploads these keystrokes to a malicious server, where it can be analyzed and people can pick out the useful passwords and credit card numbers.
BotNetA large network of computers that are under the botnet creator’s control. Each computer functions as a “bot” because it’s infected with a specific piece of malware.
RootkitA type of malware designed to burrow deep into your computer, avoiding detection by security programs and users. For example, a rootkit might load before most of Windows, burying itself deep into the system and modifying system functions so that security programs can’t detect it. A rootkit might hide itself completely, preventing itself from showing up in the Windows task manager.
RansomwareA fairly new type of malware, it holds your computer or files hostage and demands a payment. Some programs may simply pop up a box asking for money before you can continue using your computer. Such prompts are easily defeated with antivirus software.
MydoomA computer worm affecting Microsoft Windows. It was first sighted on January 26, 2004. It became the fastest-spreading e-mail worm ever (as of January 2004), exceeding previous records set by the Sobig worm and ILOVEYOU. The worm contains the text message "andy; I'm just doing my job, nothing personal, sorry," leading many to believe that the worm's creator was paid.
I Love YouA computer worm that successfully attacked tens of millions of Windows computers in 2000 when it was sent as an attachment to an email message with the text “ILOVEYOU” in the subject line.
White Hatbreaks security for non-malicious reasons, perhaps to test their own security system or while working for a security company which makes security software.
Black HatThis hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain."
Gray HatThis hacker is a combination of a black hat and a white hat hacker. This hacker may surf the Internet and hack into a computer system for the sole purpose of notifying the administrator that their system has a security defect, for example. They may then offer to correct the defect for a fee.
HacktivistThis hacker utilizes technology to publicize a social, ideological, religious or political message.
PhishingAn email messages that seem to come from trustworthy sources, such as banking entities, but attempt to harvest confidential user data.
CrimewarePrograms and social engineering designed to fraudulently obtain financial gain from either the affected user or third parties.
ZombieA compromised computer controlled by someone else.
Cookiessmall text files stored on a computer by the Internet browser when visiting web pages. The information stored by cookies has a number of objectives: it can be used to personalize web pages, to collect demographic information about visitors to a page or to monitor statistics of banners displayed, etc.
CryptoLockera ransomware trojan which targeted computers running Microsoft Windows. It propagated via infected email attachments, and via an existing botnet; when activated, the malware encrypts certain types of files stored on local and mounted network drives using RSA public-key cryptography, with the private key stored only on the malware's control servers.
Antivirus SoftwareThis computer software used to prevent, detect and remove malicious software
False PositiveThis is when your virus scanner detects a file as a virus, even when it really isn't a virus, and then tries to quarantine or delete that file.
GraywareThis is a term applied to unwanted applications or files that are not classified as malware, but can worsen the performance of computers and may cause security risks.
MacroThese are used to make a sequence of computing instructions available to the programmer as a single program statement, making the programming task less tedious and less error-prone.
WarezCopyrighted works distributed without fees or royalties, and may be traded, in general violation of copyright law. They are generally unauthorized releases by organized groups, as opposed to file sharing between friends or large groups of people with similar interest using a darknet.
PUPPotentially Unwanted Program
Microsoft Windows Malicious Software Removal ToolA freely-distributed virus removal tool developed by Microsoft for the Microsoft Windows operating system. it is an on-demand anti-virus tool ("on-demand" meaning It lacks real-time protection) that scans the computer for specific widespread malware and tries to eliminate the infection. The program is usually updated on the second Tuesday of every month and distributed via Windows Update.
Microsoft Security EssentialsAn antivirus software (AV) product that provides protection against different types of malware such as computer viruses, spyware, rootkits and Trojan horses. It runs on Windows XP, Windows Vista and Windows 7, but not on Windows 8, which has a built-in AV component.
Windows DefenderFormerly known as Microsoft AntiSpyware, is a software product that helps combat malware. t included a number of real-time security agents that monitored several common areas of Windows for changes which may be caused by spyware.
Virus Definition filesThis file is used by anti-malware programs to check for malware.
Browser hijackingThis a type of online fraud. Scammers use malicious software (malware) to take control of your computer's Internet browser and change how and what it displays when you're surfing the web.
IC3The Internet Crime Complaint Center, also known as IC3, is a multi-agency task force made up by the Federal Bureau of Investigation (FBI), the National White Collar Crime Center (NW3C), and the Bureau of Justice Assistance (BJA).
wardriveThe act of searching for Wi-Fi wireless networks by a person in a moving vehicle, using a portable computer, smartphone or personal digital assistant


FL

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities