Malware/Attacks Flashcards

1
Q

Worm

A

Worm

Like a virus but it self replicates (meaning it makes copies of itself) a virus can’t

A worm also moves by itself where as a virus needs someone or something to execute it.

Think of it like this

a worm can move alone on the ground

A virus like the flu has to be spread by a person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Trojan

A

Malware that looks like it’s being helpful but really is conducting malicious functions behind the scenes

For example a program says it is cleaning your pc but really making changes to your OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Spyware

A

Collects information without users consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Adware

A

Pop up advertisements based on your browsing habits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Rootkit

A

Software designed to gain administrator level control over a computer system

Difficult to detect because it loads before the operating system does

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Spam

A

Abuse of email/ IM

Example phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Threat vector

A

Method a threat uses to access a target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Attack vector

A

The means by which an attacker gains access to a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Botnet

A

Master computer that controls zombies

Zombies are the individual compromised computers in the botnet

Think of it as : a network of bots (bot net)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Active interception

A

A computer is placed between a sender and receiver to capture information “eavesdropping”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Privilege Escalation

A

Exploiting a bug or design flaw to gain access to resources you wouldn’t have otherwise

You gain more privileges than you are supposed to sometimes even admin privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Backdoor

A

Used in computer programs to bypass normal authentication and other security mechanisms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Logic bomb

A

Code inserted into software that is meant to initiate a malicious function when certain criteria is met

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Bluesnarfing

A

Unauthorized access or information from a computer wireless device through a Bluetooth connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Bluejacking

A

Sending unwanted messages to Bluetooth enabled devices

Kinda like pop up advertisements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Buffer overflow

A

Process stores data outside of memory

17
Q

Cross-site scripting

A

Exploits the trust a user’s browser has in a website through code injection

18
Q

Directory traversal

A

Method of accessing unauthorized root directories