Malware Infections Flashcards
Method used by an attacker to access a victim’s machine
Threat Vector
Method used by an attacker to gain access to a victim’s machine in order
to infect it with malware
Attack Vector
Malware is placed on a website that you know your potential victims will
access
Watering Hole
A collection of compromised computers under the control of
a master node
Botnet
Occurs when a computer is placed between the sender and receiver and
is able to capture or modify the traffic between them
Active Interception
Occurs when you are able to exploit a design flaw or bug in a system to
gain access to resources that a normal user isn’t able to access
Privilege Escalation
Malicious code that has been inserted inside a program and will execute
only when certain conditions have been met
Logic Bomb
Non-malicious code that when invoked, displays an insider joke, hidden
message, or secret feature
Easter Egg