Lecture 2 Flashcards
What are the 2 types of threats?
- Malicious software known as “Malware”
- Intruder is known as “Attacker”
What is Adware?
Displays popups of advertising downloads when the user is online
What is an Attack kit?
A set of tools that generates new malware automatically using a **variety of propagation **
What is a Auto-rooter?
Used to break into new machines remotely – to the highest root to gain full access
What is Backdoor?
Bypass a normal security check via a compromised system such as using a password
What are Downloaders?
Code that installs other items on the machine that is under attack. It is normally included in the malware code which is placed in a compromised system
What is Drive-by Download?
Uses a code to compromise a website to exploit a browser vulnerability to attack a client system the website is viewed
What is Flooders?
Generating a volume of data to attack a networked computer system by applying DOS attack
What is Keyloggers?
captures keystrokes in a compromised system
What is a Logic bomb?
A program that is timed to cause harm at a certain point of time. It stays inactive until the time comes.
What is a Marco Virus?
- Uses a set of macro commands used by other programs to perform a sequence of actions automatically.
- Typically embedded in a document and triggered when it is viewed or run or replicate itself into other documents
What is a Mobile code?
A code transferred between systems/across a network in an email, document, file or a website which is executed via a network or a storage device
What is Rootkit?
A set of hacker tools used after the attacker had broken into a computer and gained root-access
What is Spyware?
- Monitors the user’s activity of your computer
- Aims to gather information about a person or company
- Sent it to another computer.
- Scans the computer for files containing sensitive information
What is a Trojan horse?
- Harmless by accessing a user’s computer but secretly infects the computer