Chapter 9 Malware, Vulnerabilities and Threats Flashcards
Software exploitation
pg.299
attacks launched against applications and higher level services. They include gaining access to data using weakness int he data access objects of a database or a flaw in a service or appliations
Spyware
pg.299
differs from other malware in that it works-often actively- on behalf of a third party. Monitors the users activity and reports it to another party without informing the user
Adware
pg.301
primary purpose of the malware application is to deliver ads, then it is classified as adware, can have the same qualities as a spyware, but primary purpose is to display ads and generate revenue for the creator
Rootkits
pg.301
software programs that have the ability to hide things for certain operating system. rootkit is able to do this by manipulating functions calls to the operating system and filtering out information that would normally appear
Trojan Horses
pg.304
Programs that enter a system or network under the guise of another program. may included as an attachment or as a part of an installation, could create a backdoor or replace a valid program during installation
Logic Bombs
pg.307
programs or code snippets that execute when a certain predefined event occurs. A bomb may send a note to an attacker when a user is logged on to the Internet and is using a word processor
Backdoors
pg.308
Two different meaning. Original term refers to troubleshooting and developer hooks into systems that often circumvented normal authentication. Second type of backdoor refers to gaining access to a network and inserting a program or utility that creates an entrance for attack
Botnets
pg.309
Software running on infected computers called zombies.Runs automatically and automomously
Ransomeware
pg.309
Takes control of a system and demands that a third party be paid
Virus
pg.310
a piece of software designed to infect a computer system
Polymorphic
pg.310
these viruses change form in order to avoid detection
Stealth
pg.310
these viruses attack attempt to avoid detection by masking themselves form applications
Retroviruses
pg.310
Viruses attack or bypass the antivirus software installed on a computer
Multipartite
pg.310
Viruses attack your system in multiple ways
Armored
pg.310
Type of virus is one that is designed to make itself difficult to detect or analyze