Answered step by step
Verified Expert Solution
Question
1 Approved Answer
begin{tabular}{|c|c|c|c|c|c|c|c|} hline multicolumn{8}{|c|}{ Terms } hline Virus & Worm & Trojan & Ransomware & Rootkit & Adware & Spyware & Social Engineering hline
\begin{tabular}{|c|c|c|c|c|c|c|c|} \hline \multicolumn{8}{|c|}{ Terms } \\ \hline Virus & Worm & Trojan & Ransomware & Rootkit & Adware & Spyware & Social Engineering \\ \hline \end{tabular} Malware that pretends to be an innocent program, but really is also something else, lurking in the background. When the innocent program starts, it triggers the malicious code to execute. Locks and encrypts hard drives, demanding users pay a ransom fee to get access to their files back. Attempts to expose the compromised end-user to unwanted, potentially malicious advertising. A malicious program that replicates through physical devices such as flash drives and needs a host file to infect. Cyber criminals can use this mechanism to log the keystrokes of victims and gain access to passwords or intellectual property. The process of using or manipulating people inside the networking environment to gain access to that network from the outside. Can replicate automatically to other networked computers by exploiting vulnerabilities and send copies of itself to other computers. This malware does not require a host. A collection of programs and code that allows a persistent, undetectable presence on a computer, while maintaining privileged access as well
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started