malicious attacks,threats andvulnerabilities Flashcards

1
Q

attack tools(software programs) exploit software

A

incorporates known software vulnerabilities, data, and scripted commands to “exploit” a weakness in a computer system or IP host device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

password crackers

A

performs one of two functions: a Brute-force password attack to gain unauthorized access to a system or recovery of passwords stored as a cryptographic hash on a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Keystroke loggers

A

surveillance software or hardware that can record to a log file every keystroke a user makes with a keyboard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Backdoors

A

hidden access by developers
hackers/attackers may use it to gain access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

data modification security breach

A

data that is intentionally or accidentally modified
incomplete
truncated(process of shortening data)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

give common threat types

A

malicious software
hardware or software failure
internal attacker
equipment theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

four categories of attacksulge

A

fabrication
modification
interceptions
interruptions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is malicious software

A

any software that causes:
damage
modifies or deletes data
escalates security privileges

divulges private data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

virus

A

Attaches itself to or copies itself into another program on a computer

Tricks the computer into following instructions not intended by the original program developers

infects a host program and may cause that program to replicate itself onto other computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly