Chapter 2 Key Terms Flashcards

1
Q

Malware

A

Software designed to take over or damage a computer without the user’s knowledge or approval.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Virus

A

A program that attempts to damage a computer system and replicate itself to other computer systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Worm

A

A self-replicating malware program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Trojan horse

A

A malicious program that is disguised as legitimate or desirable software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Zombie

A

A computer that is infected with malware and is controlled by a command and control center called a zombie master.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Botnet

A

A group of zombie computers that are commanded from a central control infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Rootkit

A

A set of programs that allows attackers to maintain hidden, administrator-level access to a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Logic bomb

A

Malware designed to execute only under predefined conditions. It is dormant until the predefined condition is met.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Spyware

A

Software installed without the user’s consent or knowledge and is designed to intercept or take partial control of the user’s computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Adware

A

Malware that monitors a user’s personal preferences and sends pop-up ads that match those preferences.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Ransomware

A

Malware that denies access to a computer system until the user pays a ransom.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Scareware

A

A scam to fool a user into thinking there is some form of malware on the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Crimeware

A

Malware designed to perpetrate identity theft. It allows a hacker access to online accounts at financial services, such as banks and online retailers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Crypto-malware

A

Malicious software that uses a computer’s resources to mine cryptocurrencies in the background undetected. Also known as cryptojacking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Remote Access Trojan (RAT)

A

Malware that includes a back door to allow a hacker administrative control over the target computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Hacker

A

A person who commits crimes through gaining unauthorized access to computer systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Cracker

A

A person actively engaged in developing and distributing worms, Trojans, and viruses; engaging in probing and reconnaissance activities; creating toolkits so that others can hack known vulnerabilities; and/or cracking protective measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Script Kiddy

A

A less-skilled hacker who often relies on automated tools or scripts written by crackers to scan systems and exploit weaknesses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Potentially unwanted Program (PUP)

A

A PUP is a software inadvertently installed that contains adware, installs toolbars, or has other objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Fileless virus

A

A fileless virus uses legitimate programs to infect a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Targeted Attack

A

A type of threat in which threat actors actively pursue and compromise a target entity’s infrastructure while maintaining anonymity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Opportunistic Attack

A

An attack in which the threat actor is almost always trying to make money as fact as possible and with minimal effort.

23
Q

Insider

A

A threat agent who has authorized access to an organization and either intentionally or unintentionally carries out an attack.

24
Q

Competitor

A

A threat agent who carries out attacks on behalf of an organization and targets competing companies.

25
Q

Cybercriminal

A

A subcategory of hacker threat agents. Cybercriminals are willing to take more risks and use more extreme tactics for financial gain.

26
Q

Nation state

A

A sovereign state threat that may wage an all-out war on a target and have significant resources for the attack.

27
Q

Internal Threat

A

A threat from authorized individuals (insiders) who exploit assigned privileges and inside information to carry out an attack.

28
Q

External Threat

A

A threat from individuals or groups not associated with the organization, who seek to gain unauthorized access to data.

29
Q

Persistent Threat

A

A threat that seeks to gain access to a network and remain there undetected.

30
Q

Non-Persistent threat

A

A threat that focuses on getting into a system and stealing information. It is usually a one-time event, so the attacker is not concerned with detection.

31
Q

Open-source intelligence (OSINT)

A

Information that is readily available to the public and doesn’t require any type of malicious activity to obtain.

32
Q

White hat

A

A skilled hacker who uses skills and knowledge for defensive purposes only. The white hat hacker interacts only with systems for which express access permission is given.

33
Q

Black hat

A

A skilled hacker who uses skills and knowledge for illegal or malicious purposes.

34
Q

Gray hat

A

A skilled hacker who falls in the middle of white hat and black hat hackers. The gray hat may cross the line of what is ethical, but usually has good intentions and isn’t malicious like a black hat hacker.

35
Q

Social Engineering

A

an attack involving human interaction to obtain information or access.

36
Q

Footprinting

A

uses social engineering to obtain as much information as possible about an organization.

37
Q

Pretexting

A

Pretexting is a fictitious scenario to persuade someone to perform an action or give information.

38
Q

Elicitation

A

a technique to extract information from a target without arousing suspicion.

39
Q

Preloading

A

influencing a target’s thoughts, options, and emotions before something happens.

40
Q

SMiShing

A

(SMS Phishing) is doing phishing through an SMS message. In other words, tricking a user to download a virus, Trojan horse, or malware onto a cell phone.

41
Q

Impersonation

A

pretending to be somebody else and approaching a target to extract information.

42
Q

SPIM

A

SPIM is similar to spam, but the malicious link is sent to the target over instant messaging instead of email.

43
Q

Hoax

A

type of malicious email with some type of urgent or alarming message to deceive the target.

44
Q

Hacktivist

A

a hacker with a political motive.

45
Q

Script Kiddie

A

A less-skilled (usually younger) hacker that often relies on automated tools or scripts written by crackers to scan systems at random to find and exploit weaknesses.

46
Q

White hat hacker

A

is a professional who helps companies find the vulnerabilities in their security. Also known as an ethical hacker.

47
Q

Cybercriminal

A

A person (or team of individuals) who use technology to steal sensitive information for a profit. Cybercriminals are often associated with large organized crime syndicates such as the mafia.

48
Q

Zero-day vulnerability

A

Zero-day is a software vulnerability that is unknown to the vendor.

49
Q

Data loss

A

The loss of files and documents either accidentally or through malicious acts.

50
Q

Data breach

A

The exposure of confidential or protected data, either accidentally or through malicious acts.

51
Q

Data exfiltration

A

The unauthorized transfer of information or files from a computer.

52
Q

Identity Theft

A

A crime in which an attacker commits fraud by using someone else’s name or existing accounts to obtain money or to purchase items.

53
Q

Availability Loss

A

Loss of access to computer resources due to the network being overwhelmed or crashing.