prof messor 501 Flashcards
Keylogger
records keystorkes and other valuabel indo usually installed with malware run a key logging scanner
Adware
pop-ups that may cause performance issues
Spyware
that looks at eveyrthing can pose an how to undo issues can use malware bytes to hlep look for them
botnet
robot that waits for the main command from the mothership aka ZeuS can be used for denial of service to have all botnets to do the saem thing at onc
logic bomb
malware usually done at a specific time
phising
convincing you to give up perosnal information example a facebook login page that is not a facebook longin page always check the url or the grphics/ spelling
vishing
voice over the phone this is your bank and you need to do xyz…
spear phising
phising with inside information on a specific group of perpl eto make it more beliebale
whaling
going for top posotions in the company to phish information from them
tailgating
following someone and sneaking back in the buiding to bypass required access
impersonation
could be over the phone or in person to pretend to be someone in the company to gain info never volunteer information
dumpster diving
going into the trash to find records phone numbers anything to gain access
shoulder surfing
evesdropping for your eyestelescope reflections be awre of your surrounding
Hoaxes
ex: websites or scams sounds too good to be true
watering hole attack
infecting a third party sites when the network is really secure