Malware, Hacker Exploits, and Encryption Flashcards
What is Malware (Malicious Code)?
software or code deliberately written and released for the purpose of causing unwanted actions
What can malware do?
Can be destructive, create back doors on a network, locate and steal sensitive info, etc.
What are the two most common ways to get Malware?
Email Attachments
Web Links in emails, instant message, facebook, etc.
What does a Virus do?
Replicates by attaching to a program of file, spread by humans
Spreads from Computer to Computer through user action (downloading, copying, running file)
Passed through emails, disks, peer to peer, visiting infected websites
What does a Worm do?
Replicates and contains a payload like a virus
Can spread over a network without any user action
Difference between a worm and virus?
Difference is a worm is self reliant and does not need to attach itself to a program
What is a Trojan Horse?
Malicious software that is disguised as legitimate (tricks users into opening or running it)
What is social engineering?
non-technical, human deception to further goals or aims to get access to a system that they aren’t authorized to access.
What is a “Key Logger”?
devices that capture every key typed by the victim including space, back space, return, etc.
Are Key Stroke Loggers hardware or software?
They can be both, but usually they are software
Where are key stroke loggers most common?
public computers
What are “Script Kiddies”?
Derogatory slang word that refers to beginner hackers who go to websites and copy the code instead of creating it themselves
What are Zero Day Exploits?
Initial periods of time from where the hacker tool or exploit is released, until the security team comes up with a counter measure
What is “Google Hacking”?
Using google or any other search engine to further your hacking activity
What is Port Scanning?
Scanning your targets ports to see which ones are open