Ch. 6 - Vocab Flashcards
advanced persistent threat
well-resourced, persistent application of intrusion technologies and malware to selected targets
adware
form of malware which presents unwanted advertisements to the user
attack kit
otherwise known as crimeware
backdoor
a secret entry point into a program, used to bypass usual security access procedures
blended attack
uses multiple methods of infection to maximize speed of contagion and severity of the attack
boot-sector infector
infects a master boot record and spreads when a system is booted
bot
a system where malware subverts the computational and network resources of an infected system for use by the attacker
botnet
a collection of bots acting in a coordinated manner
crimeware
attack kits with a variety of propagation mechanisms and payload modules, which greatly expanded the population of attack that can deploy malware
data exfiltration
form of a security breach that occurs when an individual’s or company’s data is copied, transferred, or retrieved from a computer or server without authorization
downloader
code that installs other items on a machine that is under attack
drive-by-download
exploits browser vulnerability when user views a webpage to download and install malware on the system
email virus
a virus which propagates by email
infection vector
method that this code uses to propagate itself or infect a computer
keylogger
captures keystrokes on the infected machine to allow an attacker to monitor this information
logic bomb
code embedded in malware that is set to “explode” when certain conditions are met
macro virus
a virus that attaches itself to documents and uses the macro programming capabilities of the document’s application to execute and propagate
malicious software
program inserted into a system with the intent of compromising the CIA of the victim’s data, applications, or operating system
malware
otherwise known as malicious software
metamorphic virus
a virus that rewrites itself completely at each iteration
mobile code
programs that can be shipped unchanged to a heterogeneous collection of platforms
parasitic virus
type of virus that spreads by attaching itself to another program
payload
the variety of actions that a malware uses on a target
phishing
gathering sensitive information from a user from having the user fill out a form on a fake website