Chapter 2 Type of Attack Indicators Flashcards
What does C.I.A stand for?
Confidentiality, Integrity, and Availability
What is Malware?
Software that has been designed for some nefarious purpose
What is Ransomware?
A form of malware that performs some action and extracts a ransom from the user
What are trojans?
A piece of software that appears to do one thing but hides some other functionality
What is a worm?
Pieces of code that attempt to penetrate networks and computer systems, once infiltrated the worm will copy itself on the system
What are potentially unwanted programs (PUP)?
Programs that may have adverse effects on a computer security or privacy
What are Fileless Viruses?
A piece of malware operating only in memory, never touching the filesystem
What is a bot
A functioning piece of software that performs some task, under the control of another program
What is a botnet?
A series of bots controlled across the network in a group
What is Crypto-malware?
Malware that uses a systems resources to mine cryptocurrency
What are Logic Bombs
A piece of code that sits dormant for a period of time until some event or date invokes its malicious payload
What is Spyware?
Software that spies on users, recording and reporting on their activities
What is a Keylogger?
A piece of software that logs all of the keystrokes that a user enters
What are Remote Access Trojans (RATS)?
A toolkit designed to provide the capability of covert surveillance and or the capability to gain unauthorized access to a target system
What is a Rootkit
A form of malware that is specifically designed to modify the operation of the operating system in some fashion to facilitate nonstandard functionality