Hola Flashcards
jeje
possibility that a harmful event, such as an attack, will occur.
threat
weakness that makes a target susceptible to an attack.
vulnerability
has become an umbrella
malware
malicious executable code attached to another executable file
Viruses
In order to avoid detection, a virus
mutates
malicious code that replicates by independently exploiting
vulnerabilities in networks.
worms
malware that carries out malicious operations under the guise of a desired operation such as playing an online game
trojan horse
is a malicious program that uses a trigger to awaken the
malicious code
logic bomb
Cybersecurity specialists recently discovered logic bombs that attack and destroy the hardware components in a workstation or server
true
holds a computer system, or the data it contains, captive until the target makes a payment
ransomware
refers to the program or code introduced by a criminal who has compromised a system
backdoor
modifies the operating system to create a backdoor. Attackers then use the backdoor to access the computer remotely
rootkit
takes advantage of programming errors or design flaws
privilege escalation
also known as junk mail, is unsolicited email. In most cases, is a method of advertising. However, can send harmful links, malware, or
deceptive content.
spam
is software that enables a criminal to obtain information about a user’s computer activities
spyware
typically displays annoying pop-ups to generate revenue for its
authors.
adware
persuades the user to take a specific action based on fear
scareware
phishing is a form of …
fraud