This term describes any malicious software designed to damage or gain unauthorized access.
Malware
This type of malware attaches itself to legitimate files.
Virus
This type of malware pretends to be a legitimate program.
Trojan horse
This malware locks files and demands payment.
Ransomware
This type of software helps protect against malware.
Antivirus software
Malware can infect not just computers, but also these handheld devices.
Smartphones
When this happens, a virus begins spreading after an infected file is opened.
Activation
Trojans secretly open this hidden entry point into a system.
Backdoor
Ransomware does this to victim's files.
Encrypting
Keeping this up to date helps protect your system.
Operating system
One goal of malware is to steal this from users.
Information or data
Unlike viruses, these don't need human interaction to spread.
Worms
A Trojan might disguise itself as this kind of harmless software.
Game or useful tool
Victims must pay to regain this.
Access
These should be strong to prevent unauthorized access.
Passwords
Malware can target individuals as well as these large-scale systems.
Corporate networks
Worms spread quickly through these connected systems.
Networks
Hackers use this method to trick users into installing malware.
Deception (or pretending to be legitimate software)
This attack involves fake emails from trusted organizations.
Phishing
Users should avoid clicking these if they seem suspicious.
Links
This phrase describes what malware tries to gain when breaking into systems.
Unauthorized access
Some viruses do this to important data instead of just slowing computers.
Corrupting (deleting) data
This is the main goal of a Trojan after installation.
Giving hackers access to the system
Clicking these in phishing emails can install malware.
Malicious links or attachments
This field focuses on protecting systems from cyber threats.
Cybersecurity