Heads up! To view this whole video, sign in with your Courses account or enroll in your free 7-day trial. Sign In Enroll
Start a free Courses trial
to watch this video
Some attacks are considerably more aggressive, targeting your system and hiding from detection. Malware can be considered any program on your device with malicious intent. While infection does occur less frequently, even the passive varieties can lead to serious consequences.
New Terms:
- Malware -- Software that is intended to damage or disable computers and computer systems.
- Email Attachments -- Files that are sent in addition to the text body of an email. Can be used as delivery mechanisms for malware.
- RootKits -- Malware installed the system level to provide unauthorized access and control.
- Keylogger -- A type of malware that records keystrokes to potentially capture sensitive information.
- USB Drives -- Portable media devices that can be inserted into the USB ports of computers. Sometimes intentionally βdroppedβ so target will pick them up and insert them into a device, delivering a malware payload.
Related Discussions
Have questions about this video? Start a discussion with the community and Treehouse staff.
Sign upRelated Discussions
Have questions about this video? Start a discussion with the community and Treehouse staff.
Sign up
You need to sign up for Treehouse in order to download course files.
Sign upYou need to sign up for Treehouse in order to set up Workspace
Sign up