Malware Infections Flashcards
Threat Vector
Accessing a users machine by USB, unpatched software, phishing campaigns, etc.
HOW we’re going to get into a user’s machine
Attack Vector
Used by an attacker to gain access in order to infect it
Botnet
Collection of comprised computers under the control of a master node
Active Interception
When a computer is placed between the sending and receiving computer and can capture/modify the traffic
Attacker can put out a signal that will have outside devices connecting to it
When someone gets between you and the server and can take over
Privilege Escalation
Able to exploit a flaw and gain access that normal users can’t get
Gives you admin level access
Logic Bomb
Code inserted into a program that executes when certain conditions have been met