Midterm Lesson 1 Flashcards
This stands for “Malicious Software” and it is designed to gain access or installed into the computer without the consent of the user. They perform unwanted tasks in the host computer for the benefit of a third party.
Malware
8 types of malwares:
Adware
Browser hijacking software
Spyware
Virus
Worms
Trojan Horse
Botnet
Scareware
It is a special type of malware which is used for forced advertising. They either redirect the page to some advertising page or pop-up an additional page which promotes some product or event. These are financially supported by the organizations whose products are advertised.
adware
There is some malicious software which are downloaded along with the free software offered over the internet and installed in the host computer without the knowledge of the user. This software modifies the browsers setting and redirect links to other unintentional sites.
Browser hijacking software
It is a special type of which is installed in the target computer with or without the user permission and is designed to steal sensitive information from the target machine.
Spyware
Mostly it gathers the browsing habits of the user and the send it to the remote server without the knowledge of the owner of the computer. Most of the time they are downloaded in to the host computer while downloading freeware i.e. free application programs from the internet.
Spyware
________ may be of various types; It can keeps track of the cookies of the host computer, it can act as a keyloggers to sniff the banking passwords and sensitive information, etc.
Spywares
A _____ is a malicious code written to damage/harm the host computer by deleting or appending a file, occupy memory space of the computer by replicating the copy of the code, slow down the performance of the computer, format the host machine, etc.
virus
True or False:
A virus may be present in a computer but it cannot activate itself without the human intervention. Until and unless the executable file(.exe) is execute, a virus cannot be activated in the host machine.
True
They are a class of virus which can replicate themselves. They are different from the virus by the fact that they does not require human intervention to travel over the network and spread from the infected machine to the whole network.
Worms
True or False:
Worms can spread either through network, using the loopholes of the Operating System or via email. The replication and spreading of the worm over the network consumes the network resources like space and bandwidth and force the network to choke.
True
It is a malicious code that is installed in the host machine by pretending to be useful software.
Trojan horse
True or False:
Trojan horse can become a part of botnet(robot-network), a network of computers which are infected by malicious code and controlled by central controller. The computers of this network which are infected by malicious code are known as zombies.
True or False:
Trojans neither infect the other computers in the network nor do they replicate.
True
These are networks of hijacked computer devices used to carry out various scams and cyberattacks. The term “______” is formed from the word’s “robot” and “network.”
botnet
While surfing the Internet, suddenly a pop-up alert appears in the screen which warns the presence of dangerous virus, spywares, etc. in the user’s computer. As a remedial measure, the message suggests the used download the full paid version of the software. The malicious code can neither be uninstalled nor can the computer be used till the ransom is paid.
Scareware
The term ________ is used to describe a unlawful activity in which computer or computing devices such as smartphones, tablets, Personal Digital Assistants(PDAs), etc. which are stand alone or a part of a network are used as a tool or/and target of criminal activity. It is often committed by the people of destructive and criminal mindset either for revenge, greed or adventure.
cyber crime
Two categories of Cyber Crimes:
Insider Attack
External Attack
An attack to the network or the computer system by some person with authorized system access is known as _________. It is generally performed by dissatisfied or unhappy inside employees or contractors.
insider attack
When the attacker is either hired by an insider or an external entity to the organization, it is known as ________.
external attack