malware Flashcards
a program that attempts to damage a computer system and replicate itself to other computer systems
virus
a self replication program
worm
a program disguised as legitimate or desirable
trojan horse
a computer infected with malware that allows remote software updates
zombie
zombies are control by a command and control center, the administrator is know as the
zombie master
a group of zombie computers
botnet
a set of programs that allows attackers to maintain permanent administrator access to a computer
rootkit
this is designed to execute only under predefined conditions, and lays dormant until the predefined conditions are met
logic bomb
software installed without user’s consent, designed to intercept or take partial control
spyware
it monitors actions that denotes personal preferences, and then send pop-ups and add
adware
it denies access to a computer system until the user pays
ransomware
a scam to fool user into thinking they have some form of malware on their system
scareware
designed to perpetrate identity theft to allow access to online accounts at financial services
Crime-ware
computer enthusiasts that commit cyber crimes by gaining unauthorized access
hacker
ethical hackers that find vulnerabilities in computer systems
white hat hackers
un-ethical hackers that test or exploit the vulnerabilities in computer systems
black hat hackers
they apply loos ethics in their applications of their ability to exploit
gray hat hackers
they pose the greatest threat to information resources and computer network systems b
crackers
a less skilled generation of hackers
script kiddy
a term used to refer to people who break into telecommunications networks to illegally use the provided services
phreaker
on a window system, when file permissions are controlled though a network connection with the files server this is called a _____ permission
shared
on a windows system, _____ permissions controls both local and network access
NTFS
Share and NTFS permissions use a ______ ACL for controlling access
discretionary
the process of securing devices and software by reducing security exposure and tightening security controls is called
hardening
a quick fix for a problem, and normally not installed unless you have the specific problem it is intended to fix
hotfix
a manufacturers quick fix for a problem
patch
a collection of patches, hotfixes and other system enhancements that have been tested by the manufacturer for wide development
service patch
a operation system that comes hardened and validated to a specific security level is called
trusted operating system (TOS)
when a attacker tries every known combination
brute force attack
this is attack is an attack on a key containing a small data set
mathematical attack
this attack focuses on hashing
birthday attack