Security Flashcards
Worm
Standalone malware computer program that replicates itself to spread to other computers.
Worm can spread on its own, whereas a virus needs a host program or user interaction to propagate itself.
List the 7 steps of Malware removal
Verify Malware systems
Quarantine infected
Disable System Restore
Remediate (Update anti-virus, Scan and remove)
Schedule scans and run updates
Enable System Protection
Educate the end user
Rogue Anti-Virus
Malicious software that misleads users into believing there is a virus on their computer. So you download a fake antivirus (actual virus)
Pharming
Type of social engineer attack that redirects a request for a website to a similar-looking, but fake website.
attacker uses DNS spoofing to redirect the user to the fake site
Ransomware
Type of malware designed to deny access to a computer system or data until a ransom is paid.
What is a Least Privilege Policy
Concept and practice of restricting access rights for users, accounts, and computing processes to only those resources absolutely required to perform routine, legitimate activities.
Whaling
Email or web-based form of phishing that targets senior executive or wealthy individuals.
Spear Phishing
Attack focused on a target set of people, not just an indiscriminate large group of random people
Phishing
An email based social engineering attack in which the attacker sends an email from a supposedly reputable source to try to elicit private info……
Vishing
A social-engineering attack where the attacker extracts info while speaking over the phone or leveraging IP-based voice messaging services
Cross-site scripting
An attack in which the attacker inject malicious code into the Web app in order to trick it into sending things it shouldn’t to other users of the Web site.
Dictionary Attack
Attack that uses a list of common passwords to crack a user’s password
What wireless connection type supports an encrypted, but open network
WPA3
Explicit allow
(Windows Defender Firewall)
Only allow an item to traverse the firewall if the traffic matches an existing rule.
Implicit Allow
(Windows Defender Firewall)
Allows all traffic unless there is a specific rule to prevent it.