Any software that is designed to harm, exploit, or otherwise compromise a computer network, or device.
Malware/Malicious Software
Spyware often leads to
Identity theft or privacy violations
Name the 3 antivirus software's mentioned
Norton, McAfee, Bitdefender
What fruit is known for having a strong odor and being "king of fruits"
Durian
What does CPU stand for
Central Processing Unit
What type of malware secretly monitors and collects user activities such as keystrokes, browsing habits, and login credentials.
Spyware
One of the most concerning aspects of malware
How its spreads and infects devices
What should you not do when receiving unknown links from unknown or untrustworthy sources
clicking the link
What is the largest planet in our solar system
Jupiter
What is the term for the unique address given to each device with a network
IP Address
what type of malware self-replicates malware that spreads across networks without the need for a host file it can quickly infect multiple devices
Worms
3 reasons why malwares exist
Financial Gain, Espionage, and Cyber Warfare
What should you do on a regular basis to avoid potential threats or malware
Scan the system with antivirus software
What is the chemical Symbol for gold
Au
What does HTML stand for
Hyper text Markup Language
what is a type of malware that attaches itself to legitimate programs or files and spreads when those programs or files are executed?
Virus
Where should you backup data
Offline external storage or cloud storage
Updating frequently can allow:
operating system and applications to fix and improve new or existing vulnerabilities
What is the smallest country in the world
Vatican city
What is Ransomware
It is a malicious program gains access to software system, encrypts the software until the user pays the demanded sum
What is a firewall
It's a barrier between you and your own internet connection and potential threats.
Why does financial gain have a role in the causes of malware
-accessing credit card details
-selling personal data in the dark web-> identity theft
-blackmailing
-ransomware:blocking computer system until a sum is paid
-cyrptojacking:hijacks processing powers of your cpu to gain crypto currency(cost money for the cpu)
-penetration testing:legal hacking
Name at least 5 practices to prevent malware, answer's may vary.
don’t click unknown links sent by anonymous messages, close the unknown pop up ad window, don’t download files from third party sites/outdated softwares, regularly scan your device with a software protection program, be aware of scam calls, Install a fire wall/VPN, Use a stronger password
Who invented the first algorithm intended for the use of machine
Ada Lovelace
What is the Trojan Virus
Trojan virus's are disguised as helpful and trustworthy software programs. But once someone downloads it the Trojan Virus can gain access to important and sensitive data allowing it to modify, block, or delete data.