Chapter 6 Flashcards
malicious software
Advanced persistent threat
cybercrime directed at business + political targets using wide variety of intrusion technologies + malware , applied persistently + effectively to specific target over extended period , often state-sponsored
Malware
program inserted into system covertly with intent to compromise confidentiality , integrity or availability of victim’s data , applications or OS or otherwise annoy/disrupt victim
Adware
advertising integrated into software - result in pop-up ads/redirection of browser to commercial site
attack kit
set of tools for generating new malware automatically using variety of supplied propagation + payload mechanisms
- Zeus
auto-rooter
malicious hacker tool used to break into new machines remotely
backdoor/trapdoor
mechanism bypassing normal security checks - allow unauthorized access to functionality in program / compromised system
downloaders
code that installs other items on machine that is under attack - normally included in malware code first inserted on compromised system to then import larger malware package
drive-by-download
attack using code in compromised web site - exploits browser vulnerability to attack client system when site = viewed
exploits
code specific to single/set vulnerability
flooders
used to generate large volume of data to attack networked computer systems by carrying out sort of DOS attack
keylogger
logs keystrokes on compromised system - typically includes filter only returns info close to keywords
logic bomb
code inserted - lies dormant until predefined condition met - code triggers unauthorized act
macro virus
type of virus that uses macro/scripting code - embedded in document + triggered when document viewed/edited to run + replicate itself into other documents
mobile code
software can be shipped unchanged to heterogeneous collection of platforms + execute with identical semantics
rootkit
set of hacker tools used after attacker has broken into computer system + gained root-level access
spammer program
use to send large volumes of unwanted emails
spyware
software collect info from computer + transmits to another system by monitoring keystrokes ,screen data + network traffic /scan files on system for sensitive data
trojan horse
computer program appears to have useful function but also hidden + potentially malicious function that evades security measures - exploit legitimate authorization of system entity that invokes trojan horse program