Learn Malware
Study Malware using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
CS3600
CS3600
By: McKenzie Messina
Unit 1: Introduction to Computer Security, Unit 2: Symmetric Cryptography, Unit 3: Integrity ...9Decks44Flashcards1Learner -
CompTIA Sec+
CompTIA Sec+
By: James Camp
Social Engineering Techniques, Types of Attacks/Malware, Application Attacks ...29Decks377Flashcards5Learners -
Y7 revision
Y7 revision
By: Adam Knowlton
Science Biology orginisation, Science Biology reproduction, Science chemistry matter ...21Decks197Flashcards2Learners -
cyber
cyber
By: Denis T
Malware en Aanvalstypes, Cyber rollen en CIA, stakeholders, assets, threat definities ...7Decks95Flashcards1Learner -
4th YR- Social and Prof
4th YR- Social and Prof
By: HADRIAN TEMPONGKO
Cybercrime and Social Engineering- Lesson 1, Malware Attacks- Lesson 2, Hacking!!!- Lesson 3 ...4Decks94Flashcards2Learners -
Computer science
Computer science
By: B Weston 10
CPU components, MEMORY, Images ...10Decks72Flashcards1Learner -
Security+ 701
Security+ 701
By: Justus Walker
SEC+ Practice Test Questions (Jason Dion), CompTIA SYO-701 (ET) Test, Fundamentals of Security ...28Decks513Flashcards1Learner -
Security+
Security+
By: Zoubida Regzal
1.1 Social engineering attacks, 1.2 Malware & common attacks, 1.3 Application attacks ...35Decks859Flashcards6Learners -
ITN 260
ITN 260
By: Joe Schmoe
Chapter 1 - introduction To Security, Chapter 15 - Risk Mitigation, Chapter 8 - Wireless Network Security ...15Decks567Flashcards2Learners -
A+ Core 2
A+ Core 2
By: Jamin Camp
Management Console, Operating Systems, Browser Security ...8Decks116Flashcards1Learner -
CompTIA Security+ SY0-501 - Based on Objectives
CompTIA Security+ SY0-501 - Based on Objectives
By: Tánh Phạm
1.0 Threats, Attacks and Vulnerabilities (21%), 1.1 Given a scenario, analyze indicators of compromise and determine the type of malware., 1.2 Compare and contrast types of attacks. ...45Decks887Flashcards499Learners -
Cyber Security
Cyber Security
By: NS CodeWriter
Terms, Malware, General ...7Decks67Flashcards3Learners -
BTEC IT Compnent 3
BTEC IT Compnent 3
By: George Derrick
Setting Up Ad Hoc Networks, Network Security And Performance, Issues Afftecting Network Availability ...7Decks32Flashcards2Learners -
CISM Exam Prep
CISM Exam Prep
By: Bryan Scott
Information Security Governance, Business Continuity & Security, Incident Response ...20Decks186Flashcards1Learner -
Security+
Security+
By: Paul Rosario
Acronyms, Chapter 1 - Mastering Security Basics, Chapter 2 - Understanding Identity and Access Management ...5Decks492Flashcards2Learners -
CompTIA A+ Core 2
CompTIA A+ Core 2
By: Birdman Jetson
1.1 Identify Basic Features of Microsoft Windows Editions, 1.2 Microsoft Command Line Tool, 1.3 Use Features & Tools of Microsoft Windows 10 Operating System (OS) ...35Decks506Flashcards5Learners -
Security
Security
By: Ted Mosby
Cryptography, Crypto Protocols, Software Security ...10Decks141Flashcards1Learner -
CompTIA Security+ SY0-501
CompTIA Security+ SY0-501
By: L PUA
Glossary of Terms Page 1, Glossary of Terms Page 2, Glossary of Terms Page 3 ...134Decks913Flashcards6Learners -
Kierra Security
Kierra Security
By: Kierra Stephens
Ports, Access Controls, Cryptography ...6Decks85Flashcards2Learners -
Computing - Organised
Computing - Organised
By: Zayd IMRAN
Computer Systems - Translators, Data Representation - Logic Gates, Data Representation - Units ...22Decks361Flashcards1Learner -
CEH
CEH
By: Alex Santiago
MOD 16 - Hacking Wireless, MOD 17 - Hacking Mobile Platforms, MOD 18 - Iot and OT Hacking ...13Decks164Flashcards1Learner -
IMT4113 Technology
IMT4113 Technology
By: Lars Veggeland
Intro, Cryptology: intro, Cryptology: Symmetric ...15Decks94Flashcards8Learners -
Core 2
Core 2
By: Andrew Boos-Hartig
Acronyms, Steps For malware removal2Decks225Flashcards1Learner -
COSC362
COSC362
By: Hayley Krippner
Lecture 1: Course introduction, Lecture 2: Course overview (key definitions), [TODO] Lecture 3: Number Theory and Finite Fields -- Discrete Mathematics (basic number theory, modular arithmetic, groups and fields, boolean algebra) ...21Decks1,305Flashcards3Learners -
A Computer Science : Unit 1
A Computer Science : Unit 1
By: ww ww
1.1.1 Architecture Introduction, 1.1.2 Von Neumann Architecture, 1.1.3 Factors affecting CPU performance ...26Decks253Flashcards2Learners -
CompTIA Security Tests
CompTIA Security Tests
By: Hyun Rim
CH01 Overview of Security, CH02 Malware, CH03 Malware Infection ...56Decks2,102Flashcards1Learner -
Networking 2
Networking 2
By: Clay Casassa
Malware, Folders, and Printers, Misc, Computer Management ...18Decks111Flashcards10Learners -
Computing
Computing
By: Ethan Turner
Computer Systems and CPU, Von Neumann Architecture, The Fetch-Decode-Execute Cycle ...19Decks233Flashcards3Learners -
QRS A+ Core 2
QRS A+ Core 2
By: Elizabeth Perez
3.0 Software Troubleshooting QRS, 4.0 Operational Proceedures, 1.1 Compare and contrast common operating system types and their purposes. ...24Decks640Flashcards47Learners -
C394
C394
By: Alex Lau
Windows 7, Windows 8, Windows 10 ...20Decks96Flashcards1Learner