malware Flashcards
a program that attempts to damage a computer system and replicate itself to other computer systems
virus
a self replication program
worm
a program disguised as legitimate or desirable
trojan horse
a computer infected with malware that allows remote software updates
zombie
zombies are control by a command and control center, the administrator is know as the
zombie master
a group of zombie computers
botnet
a set of programs that allows attackers to maintain permanent administrator access to a computer
rootkit
this is designed to execute only under predefined conditions, and lays dormant until the predefined conditions are met
logic bomb
software installed without user’s consent, designed to intercept or take partial control
spyware
it monitors actions that denotes personal preferences, and then send pop-ups and add
adware
it denies access to a computer system until the user pays
ransomware
a scam to fool user into thinking they have some form of malware on their system
scareware
designed to perpetrate identity theft to allow access to online accounts at financial services
Crime-ware
computer enthusiasts that commit cyber crimes by gaining unauthorized access
hacker
ethical hackers that find vulnerabilities in computer systems
white hat hackers
un-ethical hackers that test or exploit the vulnerabilities in computer systems
black hat hackers
they apply loos ethics in their applications of their ability to exploit
gray hat hackers
they pose the greatest threat to information resources and computer network systems b
crackers
a less skilled generation of hackers
script kiddy
a term used to refer to people who break into telecommunications networks to illegally use the provided services
phreaker
on a window system, when file permissions are controlled though a network connection with the files server this is called a _____ permission
shared
on a windows system, _____ permissions controls both local and network access
NTFS
Share and NTFS permissions use a ______ ACL for controlling access
discretionary
the process of securing devices and software by reducing security exposure and tightening security controls is called
hardening