malicious attacks,threats andvulnerabilities Flashcards
attack tools(software programs) exploit software
incorporates known software vulnerabilities, data, and scripted commands to “exploit” a weakness in a computer system or IP host device
password crackers
performs one of two functions: a Brute-force password attack to gain unauthorized access to a system or recovery of passwords stored as a cryptographic hash on a computer system.
Keystroke loggers
surveillance software or hardware that can record to a log file every keystroke a user makes with a keyboard.
Backdoors
hidden access by developers
hackers/attackers may use it to gain access
data modification security breach
data that is intentionally or accidentally modified
incomplete
truncated(process of shortening data)
give common threat types
malicious software
hardware or software failure
internal attacker
equipment theft
four categories of attacksulge
fabrication
modification
interceptions
interruptions
what is malicious software
any software that causes:
damage
modifies or deletes data
escalates security privileges
divulges private data
virus
Attaches itself to or copies itself into another program on a computer
Tricks the computer into following instructions not intended by the original program developers
infects a host program and may cause that program to replicate itself onto other computers