Ch. 6 - Vocab Flashcards

1
Q

advanced persistent threat

A

well-resourced, persistent application of intrusion technologies and malware to selected targets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

adware

A

form of malware which presents unwanted advertisements to the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

attack kit

A

otherwise known as crimeware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

backdoor

A

a secret entry point into a program, used to bypass usual security access procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

blended attack

A

uses multiple methods of infection to maximize speed of contagion and severity of the attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

boot-sector infector

A

infects a master boot record and spreads when a system is booted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

bot

A

a system where malware subverts the computational and network resources of an infected system for use by the attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

botnet

A

a collection of bots acting in a coordinated manner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

crimeware

A

attack kits with a variety of propagation mechanisms and payload modules, which greatly expanded the population of attack that can deploy malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

data exfiltration

A

form of a security breach that occurs when an individual’s or company’s data is copied, transferred, or retrieved from a computer or server without authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

downloader

A

code that installs other items on a machine that is under attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

drive-by-download

A

exploits browser vulnerability when user views a webpage to download and install malware on the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

email virus

A

a virus which propagates by email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

infection vector

A

method that this code uses to propagate itself or infect a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

keylogger

A

captures keystrokes on the infected machine to allow an attacker to monitor this information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

logic bomb

A

code embedded in malware that is set to “explode” when certain conditions are met

17
Q

macro virus

A

a virus that attaches itself to documents and uses the macro programming capabilities of the document’s application to execute and propagate

18
Q

malicious software

A

program inserted into a system with the intent of compromising the CIA of the victim’s data, applications, or operating system

19
Q

malware

A

otherwise known as malicious software

20
Q

metamorphic virus

A

a virus that rewrites itself completely at each iteration

21
Q

mobile code

A

programs that can be shipped unchanged to a heterogeneous collection of platforms

22
Q

parasitic virus

A

type of virus that spreads by attaching itself to another program

23
Q

payload

A

the variety of actions that a malware uses on a target

24
Q

phishing

A

gathering sensitive information from a user from having the user fill out a form on a fake website

25
Q

polymorphic virus

A

creates copies in replication that are functionally equivalent but have different bit patterns, each having a different signature

26
Q

propagate

A

spread

27
Q

ransomware

A

malware that encrypts a user’s data, and demands payment in order to access the key

28
Q

rootkit

A

a set of programs to maintain covert access to the system with administrator privileges

29
Q

scanning

A

searching for other systems to infect

30
Q

spear-phishing

A

a more dangerous variant of a phishing attack, where the recipients are carefully researched by the attacker , and the email carefully crafted to suits its recipient

31
Q

spyware

A

allows monitoring of a wide range of activity on the computer

32
Q

stealth virus

A

designed to hide itself from detection by anti-virus software, using code mutation, compression, or rootkit techniques

33
Q

trapdoor

A

also known as a backdoor

34
Q

Trojan horse

A

an apparently useful program containing hidden code that performs some unwanted function

35
Q

virus

A

piece of software that can infect other programs by modifying them. Consists of three components: infection mechanism, trigger, and a payload. It goes through four phases: dormant, propagation, triggering, and execution phase

36
Q

watering-hole attack

A

variant of drive-by-download used in highly targeted attacks to minimize visibility

37
Q

worm

A

a program that actively seeks out more machines to infect, and then each infected machine serves as an automated launching pad for attacks on other machines

38
Q

zombie

A

also known as a bot

39
Q

zero-day exploit

A

exploit an unknown vulnerability that is only discovered when the worm is launched