Chp 21 Security Flashcards
Malware
Malicious Sofware Mal ware
Any software that disrupts computers and gains unauthorized access to systems, networks, and
Spyware
software that spies on system activities and transmits details to a remote computer(s)
Viruses
A program that infects files in an operating system.
Rewrites files to do what the programmer wants. Only works if executed by the user.
Worms
Viruses that can self activate
Trojan Horse
Malware disguised as something else
Rootkits
Malware that hides in the root folder
Ransomware
Malware that encrypts a targets computer files. Prevents use until the programmer gets what they want.
Spear Phishing
Specific target Phishing
Phishing
Bogus websites or fraudulent e-mails that trick users into providing personal info.
Whaling
High priority target Spear Phishing
Spoofing
Attacks that puport to come from trustworthy sources.
Man in the Middle
The Attacker intercepts info through a connection and reads it before sending it to its destination.
SOHO
Small Office Home Office