information security Flashcards
the quality or state of
being secure— to be free from danger
SECURITY
malware that comes with a downloaded file that a user
requests
Drive-by downloads
a computer program that has the ability to replicate or make copies of itself,
and spread to other files
Viruses
malware that is designed to spread from computer to computer
Worms-
malware that prevents you from accessing your computer or files and
demands that you pay a fine
Ransomware
appears to be benign, but then does something other than expected.
Often a way for viruses or other malicious code to be introduced into a computer system
Trojan horses
feature of viruses, worms, and Trojans that allows an attacker to remotely access a compromised computer
Backdoors
type of malicious code that can be covertly installed on a computer when
connected to the Internet.
Bot
collection of captured bot computers
Botnet
is a threat at both the client and the server levels, although servers
generally engage in much more thorough anti-virus activities than do consumers.
Malicious code
program that installs itself on a computer, typically without the user’s informed consent
Potentially unwanted programs (PUPs)
a PUP that serves pop-up ads to your computer
Adware
- a program that can monitor and change the settings of a user’s
browser
Browser parasites
a program used to obtain information such as a user’s keystrokes, e-mail,
instant messages, and so on
Spyware
any deceptive, online attempt by a third party to obtain confidential information for
financial gain
Phishing -
exploitation of human fallibility and gullibility to distribute
malware
Social engineering
an individual who intends to gain unauthorized access to a computer
system
Hackers
within the hacking community, a term typically used to denote a hacker
with criminal intent
Crackers
cybervandalism and data theft for political purposes
Hacktivism
-intentionally disrupting, defacing, or even destroying a site
Cybervandalism
considered the good guys because they follow the rules when it comes to hacking into systems without permission and obeying responsible disclosure laws
white hat
may have good intentions but might not disclose flaws for immediate fixes
prioritize their own perception of right versus wrong over what the law might say
gray hat
considered cybercriminals; they don’t lose sleep over whether or not something is illegal or wrong
exploit security flaws for personal or political gain–or for fun
black hat
common security threats
Malware
PUPs
Phishing
Hacking
Data breach
Sniffing
Insider attacks & unsecure software
Social network & mobile platform issues
types of malware
Drive-by downloads
Viruses
Worms
Ransomware
Trojan horses
Backdoors
Bot
types of PUPs
Adware
Browser parasites
Spyware
PUP stands for?
Potentially unwanted programs
types of phishing
Social engineering
types of hacking
Crackers
Hacktivism
Cybervandalism