Chapter 2 - Malware And Social Engineering Attacks Flashcards
Malware
Software that enters a computer system without the users knowledge or consent and then performs an unwanted and usually harmful action.
The four traits that a malware can possess
1) circulation
- viruses
- worms
2) infection
- Trojans
- ransomware
- crypto-malware
3) concealment
- rootkit
4) payload capabilities
Virus
Malicious computer code that reproduces itself on the same computer
Worm
A malicious program that uses a computer network to replicate.
Trojan
An executable program that is advertised as performing one activity but which also performs a malicious activity.
Remote access Trojan (RAT)
A Trojan that also gives the threat agent unauthorized remote access to the victims computer by using specially configured communication protocols.
Ransomware
Malware that prevents a users device from properly and fully functioning until a fee is paid.
Crypto-malware
Malware that encrypts all the files on the device so that they cannot be opened.
Rootkit
Malware that hides its presence or presence of other malware.
Spyware
Tracking software that is deployed without the consent or control of the user.
Keylogger
Spyware that silently captures and stores each keystroke that a user types on the computers keyboard.
Adware
A software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
Logic bomb
Computer code that lies dormant until it is triggered by a specific logical event.
Back door
Software code that gives access to a computer, program, or a service that circumvents any normal security protections.
Bot (zombie)
An infected computer that is under the remote control of an attacker for the purpose of launching attacks.
Phishing
Sending an email or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information.
Spear phishing
A phishing attack that targets only specific users.
Whaling
A phishing attack that targets only wealthy individuals.
Vishing
A phishing attack that uses telephone calls instead of emails.
Hoax
False warning.
Watering hole attack
A malicious attack that is directed toward a smaller group of specific individuals by embedding malware in a website frequented by these individuals.
Tailgating
When an unauthorized individual enters a restricted-access building by following an authorized user.
Shoulder surfing
Watching a user enter secret information. (On a keypad)