Cyber 160 Module 3~ Threats and Attacks and Endpoints Flashcards
**
network connected hardware devices
endpoint
software that enters a computer system without the users knowledge or consent and then performs, unwanted and harmful actions
malware
imprison
prevents a user endpoint device from properly and fully functioning until a fee is paid
ransomware
imprison
type of ransomware that encrypts all the files on the devices so that none of them can be opened
cryptoware
imprison
malicious computer code that is attached to a file
Ex: user might send an infected email to another user and once the virus reaches the computer it begins to infect it
file-based virus
launch
does not attatch to a file, takes advantage of native services and proccesses that are part of the operating system to avoid detection and carry out it’s attacks
fileless virus
launch
uses a computer network to replicate
net virus or worm
launch
infected computer placed under the remote control of an attacker for the purpose of launching attacks
zombie or bot
launch
a structure that sends instructions to infected bot computers
command and control (C&C)
launch
tracking software that’s developed without the consent or control of the user
spyware
snoop
silently caputres and stores each keystroke that a user types on the computer keyboard
keylogger
snoop
software that users do not want on their comptuer that comes pre-installed
Ex: pop-up windows
potentially unwanted programs (PUPs)
deceive
executable program that masquerades as performing a kind activity but also does something malicious
trojan
deceive
basic functionality of a trojan but also gives the threat agaent unauthorized remote access to the victim’s computer by using specially configured command protocols
remote access trojan (rat)
deceiver
computer code that is typically added to a legitimate program but lies dormant and evades detection until a specific logical event triggers it
logic bomb
evade
fives access to a computer program or seervice that cirumvents any normal security protectections ; allows attacker to return and bypass securtiy settings
backdoor
evade
hides its presence and the presence of other malware on the computer
rootkit
evade
attack takes advtage of a website that accepts user input without validating
cross-site scripting (xss)