1.1, 1.2 , 1.6 (Malware, Attacks, Impact of Vulnerabilities) Flashcards
1.1, 1.2, 1.6
when resources (such as processor and memory) are overloaded
resource exhaustion
a result of many DoS and DDos attacks, results in service interruption
resource exhaustion
malicious code that attaches itself to an application and runs when application is started
virus
often installed by malware on systems to bypass normal authentication methods
backdoor
looks legitimate but is actually malicious
trojan
can come as pirated software, useful utility, a game, or something else users may be tempted to download
trojam
masquerades as an anti-virus software
rogueware
type of malware that takes control of a user’s system or data
ransomware
installed on users systems without their awareness or consent
spyware
this can slow a system down, resulting in poorer performance
A. Adware
B. Trojan
C. Rootkit
D. Spyware
D. Spyware
group of programs that hides the fact that the system has been infected or compromised by malicious code
rootkit
action that refers to intercepting system-level functions calls, events or messages
hooking
system-level/kernel and can modify system files and system access
rootkits
hide their running processes to avoid detection with hooking techniques
rootkit
practice of sending email to users with purpose of tricking them into revealing personal information or clicking on a link
phishing
security feature that prevents code from executing in memory regions marked as non-executable
data execution prevention (DEP)
uses existing computer scripts or code to launch attacks
script kiddies
type of malware that allows attackers to take control of systems from remote locations
Remote Access Trojan (RAT)
sometimes includes a keylogger that records user keystrokes
spyware