More Flashcards
Viruses, Malware & Macro viruses are the…
Three types of Malicious Code
A virus written in a macro language: that is to say, a language built into a software application such as word processor
Macro virus
*some applications (like parts of Microsoft Office) allow macro programs to be embedded in documents so that the program will run automatically when the document opens
^^^This provides a distinct mechanism by which viruses can be spread
What are the System Security Threats?
Privilege escalation, Spyware, Adware, & Rootkits
Software designed to hide the existence of certain processes or programs from normal methods of detection and enable continued access to a computer
Rootkits
*hides itself from the operating system. Written to circumvent antivirus that is out of date
A program that searches out other programs and infects them by embedding a copy of itself. When the infected program executes, the embedded virus is executed, which propagates the infection
Virus
Hosts that are directly reachable from untrusted networks
DMZ (Demilitarized Zone)
NAT (Network address translation)
Internal addresses unreachable from external network
〰enables a local-area network (LAN) to use one set of ip addresses for internal traffic and a second set for external traffic
What are some purposes of NAT?
- Provides a firewall by hiding internal ip addresses
- Enables a company to use more internal ip addresses
- Let’s a company combine multiple ISDN connections into a single internet connection
A list of each object (directory or file) and user access privileges such as read, write or execute
ACL (Access Control List)
Administration assigning too much privileges or when software developers leave backdoors in the programs
Privilege escalation
Monitors users activity, gathers information for marketing, or tries to get CC data
Spyware
Used when referencing any type of program that downloads or displays unwanted banner ads in the software being used
Adware