Objective 3b Flashcards
Also known as malware
Malicious Logic
Piece of malware that replicates by inserting copies of itself into other computer programs or data files
Virus
Self-replicating malware traveling through network without need for human interaction which is main difference between worm and virus
Worm
Program that presents itself as useful but is actually malicious
Trojan
Malicious code designed to run in response to specific event
Logic Bomb
Software designed to hide fact system has been infected by malware
Rootkit
Lessens threat or its impact
Mitigation
Makes users aware of different threats and vulnerabilities
Information Assurance Program
Day-to-day tasks established by policies in order to ensure users behave properly
Security Policies
Use of vulnerability assessment tools to find & track network vulnerabilities
Readiness Assessment
Used to control, prevent, identify, and report vulnerabilities at host and network level to protect networks
Internal Controls
Any actions, devices, procedures, or techniques meeting or opposing a threat
Counter Measures
Firewall is software or hardware based network security system controlling incoming and outgoing network traffic
Boundary Protection
Scans, audits, and monitors the security infrastructure for signs of attacks in progress
Intrusion Detection Systems
Can protect computer systems by incorporating this
Anti-Virus