Seguridad 2

Differs from a virus because binds itself to non-executable files, such as image files, audio files, or games.
Is a malicious program that uses a trigger to awaken the malicious code. This malicious program remains inactive until that trigger event happens.
Holds a computer system, or the data it contains, captive until the target makes a payment.
Refers to the program or code introduced by a criminal who has compromised a system.
It's purpose is to grant the cyber criminals future access to the system even if the organization fixes the original vulnerability used to attack the system.
Modifies the operating system to create a backdoor.
The majority of antivirus suites catch most widespread forms of malware.
Many forms of malware achieve their objectives through exploitation of vulnerabilities in software, both in the operating system and applications.
Also known as junk mail, is unsolicited email. Can send harmful links, malware, or deceptive content.
Is software that enables a criminal to obtain information about a user’s computer activities. Includes activity trackers, keystroke collection, and data capture.
0
{"name":"Seguridad 2", "url":"https://www.quiz-maker.com/QBZEXFJ5H","txt":"Differs from a virus because binds itself to non-executable files, such as image files, audio files, or games., Is a malicious program that uses a trigger to awaken the malicious code. This malicious program remains inactive until that trigger event happens., Holds a computer system, or the data it contains, captive until the target makes a payment.","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}
Powered by: Quiz Maker