information security Flashcards
Common Security Threats
Malware
potentially unwanted programs (Pups)
phishing
hacking
data breach
sniffing
attacks and unsecured software
Network & Mobile Platforms
malware stands for
malicious software
malware that comes with a downloaded file that a user requests
Drive-by downloads
a computer program that has the ability to replicate or make copies of itself,
and spread to other files
Viruses
-malware that is designed to spread from computer to computer
worms
malware that prevents you from accessing your computer or files and
demands that you pay a fine
Ransomware
-appears to be benign, but then does something other than expected.
Often a way for viruses or other malicious code to be introduced into a computer system
Trojan horses
feature of viruses, worms, and Trojans that allows an attacker to remotely
access a compromised computer
backdoors
- type of malicious code that can be covertly installed on a computer when
connected to the Internet. Once installed, the bot responds to external commands sent by the attacker
bot
- collection of captured bot computers
botnet
is a threat at both the client and the server levels, although servers
generally engage in much more thorough anti-virus activities than do consumers.
Malicious code
program that installs itself on a computer, typically without the user’s informed consent
Potentially unwanted programs (PUPs)
a PUP that serves pop-up ads to your computer
adware
a program that can monitor and change the settings of a user’s browser
Browser parasites
a program used to obtain information such as a user’s keystrokes, e-mail,
instant messages, and so on
spyware
any deceptive, online attempt by a third party to obtain confidential information for
financial gain
phishing
exploitation of human fallibility and gullibility to distribute malware
Social engineering
an individual who intends to gain unauthorized access to a computer
system
hackers
within the hacking community, a term typically used to denote a hacker
with criminal intent
Crackers
cybervandalism and data theft for political purposes
Hacktivism
-intentionally disrupting, defacing, or even destroying a site
Cybervandalism
occurs when an organization loses control over its information to outsiders
Data breach
is one of the most feared occurrences on the Internet. Fear that credit card information will be stolen prevents users from making online purchases in
many cases.
Credit card fraud / theft
involves the unauthorized use of another person’s personal data for illegal
Identity fraud