Exam 3 Flashcards
Ransomware
is malicious software that infects your computer and displays messages demanding a fee to be paid in order for your system to work again.
Viruses
computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code.
Worms
malware that spreads copies of itself from computer to computer
Trojan horses
of malware that is often disguised as legitimate software.
Blended threat
malicious programs that combine the functionality of different types of malware such as Trojans, worms, and backdoors.
Distributed denial-of-service attacks
occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers.
Rootkits
is malicious software that is extremely difficult to spot and, therefore, very difficult to remove
Advanced persistent threat
cyberattack executed by criminals or nation-states with the intent to steal data or surveil systems over an extended time period
Spear Phishing
Targeting Phishing
Smishing
Text Phishing
Vishing
Direct Voice contact phishing
Cyberespionage
is a form of cyber attack that is carried out against a competitive company or government entity.
cyberterrorism
the politically motivated use of computers and information technology to cause severe disruption or widespread fear in society
Managed Security Service Provider (MSSP)
managed security services are network security services that have been outsourced to a service provide
Intrusiondetectionsystem
Notifies network security personnel when it detects network traffic that attempts to circumvent the security measures of a networked computer environment