Security Flashcards
Malware
Any type of software that is used to disrupt computers and gain unauthorized acess to systems, networks and data
Spyware
Software that spies on system activities and transmis details of web searches or other activities to remote computers.
Fake pop up windows and causes slow performance
Viruses
Infects files in an operating system; Can replicate but only if the user executes them
Worms
Can self-replicate; no user intervention is required
Trojan Horse
Malware programs disguised as popular videos or website links that trap keystrokes or transmit sensitve information
Rootkits
A concealment method used by many types of malware to prevent detection by normal antivirus and anti-malware programs.
Examples: Renamed system files, file permission changes or if files go missing
Phishing
Creation of bogus websites or sending fraudulent e-mails that trick users into providing personal, bank or credit card information.
Spear Phishing
The sending of spoof messages that appear to come from an internal source requesting confidential information
Spoofing
Malware attacks that purport to come from a trustworthy source
Social Engineering
Variety of methods to convince computer uses to provide acess to restricted systems
Shoulder Surfing
Attempting to view physical documents from a users computer
Brute Forcing
Method of cracking passwords by calculating and using every possible combination
Tailgating
When an unauthorized person attempts to accompany an authorized person into a secure area by following them closely