chap 1 part 2 Flashcards
intellectual property (IP)?
information owned by a company and protected by law (copyrights, etc.)
trade secrets?
company plans, customer lists, price lists, etc.
malware?
evil software: computer virus, worms, trojans, RATS (remote access Trojans) spam, etc.
viruses?= work how/?
spread through email by attaching themselves to other legitimate programs such as emails, text, etc.
worms?
full programs do not attach to other programs. uses security flaw in computers and then uses Direct Propagation to spread on own between all connected computers.
blended threats?
malware propagates via compromised webpages containing mobile code, viruses, etc.
payloads?
pieces of code that do damage (malicious payload = heavy damage) goes into effect after certain parameters are met. implemented via worms/ viruses.
blended threats?
malware propagates via compromised webpages containing mobile code/ viruses.
direct propagation worm is what?
a worm that takes advantage of a computers security flaw and self propagates to all connected computers. everything can be infected in 10 minutes. the mere self propagation can cause networks to crash due to the bandwidth usage.
mobile malware?
spreads via email attachments, (virus) self propagating worms or blended threats.
non-mobile malware?
trojan horses/ root kits. placed by hacker on a computer, by a virus. part of payload, social engineering (tricked into downloading). or when webpages are downloaded.
Trojan horse?
a program that deletes a system file then re-names itself after said file.
Remote access Trojans?
hidden Trojan that allows a computer to be controlled remotely for malicious use.
spyware?
cookies, key loggers, password stealing software. data mining. (Trojan horse programs)
rootkit?
a set of software tools that enable an unauthorized user to gain control of a computer system without being detected. (hides from the root or admin)