Lesson 2 Flashcards
attaches itself to a program, file, or disk.
When the program is executed, it activates and replicates itself.
VIRUS
Independent program that replicates itself and sends copies from computer to computer across network connections.
WORMS
Malware logic executes upon certain conditions. The program is often used for otherwise legitimate reasons.
LOGIC BOMB
Masquerades as a benign program while quietly destroying data or damaging your system
TROJAN HORSE
manipulates people into performing actions or divulging confidential information.
SOCIAL ENGINEERING
A seemingly trustworthy entity asks for sensitive information such as SSN, credit card numbers, login IDs or passwords via e-mail.
PHISHING
leads to a counterfeit webpage which collects important information and submits it to the owner.
PHARMING
An attacker pretends to be your final destination on the network. When a person tries to connect to a specific destination, an attacker can mislead him to a different service and pretend to be that network access point or server
MAN IN THE MIDDLE ATTACK
Upon penetrating a computer, a hacker may install a collection of programs.
Modifies the Operating System.
ROOTKIT
An unauthorized acquisition of electronic data that compromises the security, confidentiality or integrity of “personal information”.
GEORGIA DATA BREACH NOTIFICATION LAW
Some Symptoms for Identifying Security Compromises:
- Antivirus software detects a problem.
- Disk Space disappears unexpectedly.
- Pop-ups suddenly appear
- The computer slows down to a crawl.
- The mouse pointer moves by itself.
- The computer shuts down or reboots.
Some Symptoms for Malware/ Spyware Detection:
- Changes to your browser homepage.
- Ending up on a strange site when conducting a search.
- System-based firewall is turned off automatically.
- Excessive pop-up windows.
- Lots of network activity while not active.
- Poor system performance.
Examples of Leading Threats?
- Virus
- Worms
- Logic Bombs
- Trojan Horses
- Social Engineering
- Rootkits
- Botnets
Computer-savvy
programmer creates
attack software.
Possible question?
CYBER-CRIMINALS
duh
Unsophisticated computer users who know how to execute programs.
Possible question?
SCRIPT-KIDDIES
just like us students lol