Ch. 6 - Vocab Flashcards

1
Q

advanced persistent threat

A

well-resourced, persistent application of intrusion technologies and malware to selected targets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

adware

A

form of malware which presents unwanted advertisements to the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

attack kit

A

otherwise known as crimeware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

backdoor

A

a secret entry point into a program, used to bypass usual security access procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

blended attack

A

uses multiple methods of infection to maximize speed of contagion and severity of the attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

boot-sector infector

A

infects a master boot record and spreads when a system is booted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

bot

A

a system where malware subverts the computational and network resources of an infected system for use by the attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

botnet

A

a collection of bots acting in a coordinated manner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

crimeware

A

attack kits with a variety of propagation mechanisms and payload modules, which greatly expanded the population of attack that can deploy malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

data exfiltration

A

form of a security breach that occurs when an individual’s or company’s data is copied, transferred, or retrieved from a computer or server without authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

downloader

A

code that installs other items on a machine that is under attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

drive-by-download

A

exploits browser vulnerability when user views a webpage to download and install malware on the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

email virus

A

a virus which propagates by email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

infection vector

A

method that this code uses to propagate itself or infect a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

keylogger

A

captures keystrokes on the infected machine to allow an attacker to monitor this information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

logic bomb

A

code embedded in malware that is set to “explode” when certain conditions are met

17
Q

macro virus

A

a virus that attaches itself to documents and uses the macro programming capabilities of the document’s application to execute and propagate

18
Q

malicious software

A

program inserted into a system with the intent of compromising the CIA of the victim’s data, applications, or operating system

19
Q

malware

A

otherwise known as malicious software

20
Q

metamorphic virus

A

a virus that rewrites itself completely at each iteration

21
Q

mobile code

A

programs that can be shipped unchanged to a heterogeneous collection of platforms

22
Q

parasitic virus

A

type of virus that spreads by attaching itself to another program

23
Q

payload

A

the variety of actions that a malware uses on a target

24
Q

phishing

A

gathering sensitive information from a user from having the user fill out a form on a fake website

25
polymorphic virus
creates copies in replication that are functionally equivalent but have different bit patterns, each having a different signature
26
propagate
spread
27
ransomware
malware that encrypts a user's data, and demands payment in order to access the key
28
rootkit
a set of programs to maintain covert access to the system with administrator privileges
29
scanning
searching for other systems to infect
30
spear-phishing
a more dangerous variant of a phishing attack, where the recipients are carefully researched by the attacker , and the email carefully crafted to suits its recipient
31
spyware
allows monitoring of a wide range of activity on the computer
32
stealth virus
designed to hide itself from detection by anti-virus software, using code mutation, compression, or rootkit techniques
33
trapdoor
also known as a backdoor
34
Trojan horse
an apparently useful program containing hidden code that performs some unwanted function
35
virus
piece of software that can infect other programs by modifying them. Consists of three components: infection mechanism, trigger, and a payload. It goes through four phases: dormant, propagation, triggering, and execution phase
36
watering-hole attack
variant of drive-by-download used in highly targeted attacks to minimize visibility
37
worm
a program that actively seeks out more machines to infect, and then each infected machine serves as an automated launching pad for attacks on other machines
38
zombie
also known as a bot
39
zero-day exploit
exploit an unknown vulnerability that is only discovered when the worm is launched