Chapter 18 - Working with Windows 8/8.1 Flashcards
What is malware?
Any software designed to disrupt or damage a system
What is spyware?
Distributed without user intervention or knowledge, monitors activity on the network (*Keylogger is a type of spyware)
What is a virus?
A software code that is deliberately created by an attacker. Viruses may collect sensitive information or may alter and destroy information
What is a worm?
A piece of code that uses the network to replicate itself. Worms consume bandwidth on the network *You would notice that your network is slowing down
What is a trogan?
A malicious software disguised as a legitimate program
What is Rootkit?
A malicious program that gains full access to a computer program. Often a direct attack on a system using a vulnerability or password *Gets down to the root/basic level of a computer *Runs processes in the background=rootkit
What is Ransomware?
Software that blocks access to a computer system until a sum of money is paid
What are types of phishing?
Vishing- attacker uses phone calls to get information Spearfishing,- attack focused on a specific group of people
Whaling- An attacker focusing on a high profile individual such as CEOs
What is Social Engineering?
Physically or verbally pretending to be someone else to gain access to information. *Done in person *Vishing is the verbal form of social engineering
What is a DOS?
Denial of Service- Sending enough requests to overload a resource or even stopping its operation
What is a DDOS?
Distributed DOS- An attack launched from many computers called zombies (is an infected computer) or botnets
What are Zombies/Botnets?
Services controlled remotely or automatically without the user’s knowledge.
What is Spoofing?
Uses a forged MAC or IP address to impersonate a trusted computer *Associated with MITM attack
What is a MITM attack?
Man in the middle- Intercepting communication between computers to steal information transiting through the network
What is DNS poisoning?
Changing DNS records to impostor servers
What is a Zero-Day Virus/Attack?
A type of malware that is exclusive, resulting in panic and disarray to mitigate the issue.
What is a Brute Force Attack?
A trial and error method used to gain access to certain data.
What is a Dictionary Attack?
A type of brute force attack where dictionary words are used to generate a list of possible passwords.
What is an RSA token?
Uses software on computer and uses a physical token
What is SSO?
Single Sign-on- An access control method that allows for a single username and password to be used to access multiple accounts that use different usernames and passwords.
What’s the difference between EFS and Bitlocker?
EFS encrypts files while Bitlocker encrypts your entire hard drive itself.
What is a PII?
Personable Identifiable Information (PII)- Data that is hard to deny *Mother’s maiden name, address, etc
(PHI = Personal Health Information)