Ch. 6 - Vocab Flashcards
advanced persistent threat
well-resourced, persistent application of intrusion technologies and malware to selected targets
adware
form of malware which presents unwanted advertisements to the user
attack kit
otherwise known as crimeware
backdoor
a secret entry point into a program, used to bypass usual security access procedures
blended attack
uses multiple methods of infection to maximize speed of contagion and severity of the attack
boot-sector infector
infects a master boot record and spreads when a system is booted
bot
a system where malware subverts the computational and network resources of an infected system for use by the attacker
botnet
a collection of bots acting in a coordinated manner
crimeware
attack kits with a variety of propagation mechanisms and payload modules, which greatly expanded the population of attack that can deploy malware
data exfiltration
form of a security breach that occurs when an individual’s or company’s data is copied, transferred, or retrieved from a computer or server without authorization
downloader
code that installs other items on a machine that is under attack
drive-by-download
exploits browser vulnerability when user views a webpage to download and install malware on the system
email virus
a virus which propagates by email
infection vector
method that this code uses to propagate itself or infect a computer
keylogger
captures keystrokes on the infected machine to allow an attacker to monitor this information