lsw28598@email.vccs.edu Flashcards
study for SYO-501 sec+
viruses
Virus is a specific type of malware by itself. It is a contagious piece of code that infects the other software on the host system and spreads itself once it is run. It is mostly known to spread when software is shared between computers. This acts more like a parasite.
Crypto-malware
Crypto-ransomware is a type of harmful program that encrypts files stored on a computer or mobile device in order to extort money. Encryption ‘scrambles’ the contents of a file, so that it is unreadable.
worm
This type of malware will replicate itself and destroys information and files saved on the host PC. It works to eat up all the system operating files and data files on a drive.
Trojan
Trojans are a type of virus that are designed to make a user think they are a safe program and run them. They may be programmed to steal personal and financial information, and later take over the resources of the host computer’s system files. In large systems, it may attempt to make a host system or network resource unavailable to those attempting to reach it. Example: you business network becoming unavailable.
Rootkit
A rootkit is a program or, more often, a collection of software tools that gives a threat actor remote access to and control over a computer or other system. While there have been legitimate uses for this type of software, such as to provide remote end-user support, most rootkits open a backdoor on victim systems to introduce malicious software, such as viruses, ransomware, keylogger programs or other types of malware, or to use the system for further network security attacks. Rootkits often attempt to prevent detection of malicious software by endpoint antivirus software.
keylogger
a computer program that records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information.
adware
software that automatically displays or downloads advertising material (often unwanted) when a user is online.
Spyware
software that enables a user to obtain covert information about another’s computer activities by transmitting data covertly from their hard drive.
bots
self-propagating malware that infects its host and connects back to a central server(s). The server functions as a “command and control center” for a botnet, or a network of compromised computers and similar devices.
RAT
Remote Access Trojan. malware program that includes a back door for administrative control over the target computer. RATs are usually downloaded invisibly with a user-requested program – such as a game – or sent as an email attachment.
logic bomb
a set of instructions secretly incorporated into a program so that if a particular condition is satisfied they will be carried out, usually with harmful effects.
backdoor
a feature or defect of a computer system that allows surreptitious unauthorized access to data.
social engineering attacks
phishing, spear phishing, whalinf, vishing, tailgating,impersonation, dumpster diving, shoulder surfing, watering hole attacks
application/service attacks
Dos, Ddos, man-in-the-middle, buffer-overflow, injection, cross-site scripting, cross-site request forgery, privilege escalation, ARP poisoning, amplification, DNS poisoning, domain hijacking, man-in-the-browser,zero day, replay, pass the hash, hijacking, clickjacking, session highjacking, url hijacking, typo squatting, driver manipulation, shimming, refactoring, mac spoofing, ip spoofing
DoS
denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.