10-1 Flashcards
a small file containing data that is put on you machine by a website you vist
cookie
a type of trojan horse that another program onto the target machine
dropper
a list of entities together with their access rights that are authorized to have access to a resource
access control list
malware that seeks to create pop-up ads on the machine and eventually drains the machine’s resources until the machine becomes completely unusable
adware
spyware that is loaded as a java applet embedded in a web page
RedSheriff
a remote administration system that allows a user to control a computer across a WCP/IP connection using a simple console or GUI Application
Back Orfice
a type of trojan horse that repackages legitimate android apps such as Facebook or the game candy crush and includes adware with them
shedun
a type of trojan horse that appears as an IQ test application and installs a rootkit on the target system
brain test
One defense against trojan horses is to prevent all ____________ , but this is not particulaly practical
downloading
common trojan horse actions include
erasing files spreading other malware use for DOS look for personal info install a backdoor
_________ gives the remote user as much , if not more control of the target machine then the person who downloaded it. small and entirely self installing
Back orfice
it can be attached to any other windows executable which run normally after installing the server.
back orfice
back orfice does not show up inthe task list or __________ list
close program
this program is launched every time the computer is started
back orfice
this can infect windows XP, Vista, and 7. and poses as an anti-spyware program. it actually disables security-related processes of antivirus programs. it will alter the windows registry. the user will receive a bunch of false security messages
Anti-spyware 2011