MIDTERM EXAM | LESSON 3-6 Flashcards
a business policy that permits, and in some cases encourages, employees to use their own mobile devices
Bring Your Own Device
Common Computer Attacks/Type of Exploits
virus
worm
Trojan horse
spam
distributed denial-of-service
rootkit
phishing
spear-phishing
smishing
vishing
a piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner.
Virus
a harmful program that resides in the active memory of the computer and duplicates itself
Worms
a program in which malicious code is hidden inside a seemingly harmless program
Trojan Horse
a form of low-cost commercial advertising, sometimes for questionable products such as pornography, phony get-rich-quick schemes, and worthless stock
Spam
a malicious hacker takes over computers via the Internet and causes them to flood a target site with demands for data and other small tasks
Distributed Denial-of-Service (DDoS) Attacks
is a set of programs that enables its user to gain administrator-level access to a computer without the end user’s consent or knowledge
rootkit
is the act of fraudulently using email to try to get the recipient to reveal personal data.
Phishing
a variation of phishing in which the phisher sends fraudulent emails to a certain organization’s employees. It is known as ____ because the attack is much more precise and narrow,
Spear-phishing
another variation of phishing that involves the use of Short Message Service (SMS) texting
Smishing
a type of phishing attack where scammers use phone calls to trick individuals into revealing personal information
Vishing
Types of Perpetrators
HACKERS
CRACKERS
MALICIOUS INSIDERS
INDUSTRIAL SPIES
CYBERCRIMINALS
HACKTIVISTS
CYBERTERRORISTS
Types of Perpetrators
Test limits of system and/or gain publicity
Hackers
Types of Perpetrators
Cause prob;em, steal data, and corrupt system
Crackers
Types of Perpetrators
Gain financially and/or disrupt company’s informatio and business operations
Malicious Insiders
Types of Perptrator
Capture trade secrets and gain competitie advantage
Industrial Spies
Types of Perpetrators
Gain Financially
Cybercriminals
Types of Perpetrators
Promote Political ideology
Hacktivists
Types of Perpetrators
Destroy infrastructure componenent of financial institutions, utilities, and emergency response units
Cyberterrorrists