Terms Flashcards
A computer that is under the control of a hacker without the owner’s knowledge. Relatively benign. Cripple websites by flooding them with information.
Zombie
Standalone programming that doesn’t need to copy itself to a host or require human interaction to spread. Self replicating malware that duplicates itself to spread to uninflected computers.
Worm virus
A file object that is placed on a web page or in an email message to monitor user behavior. Unlike a cookie, it does not require the user’s permission. Can be detected by looking at the source version of the page to find a tag that loads from a different server than the rest of the page.
Web bugs
Driving around with a laptop to find unsecured wireless LANs to gain free web service or illegal access to an organization’s data.
War driving
Malicious code that copies itself to another program, boot sector, or document and changes how a computer performs.
Virus
Autonomously performs actions such as tweeting, retweeting, liking, etc.
Twitter bot
A malicious program is hidden in an innocent looking email attachment or free game. Unlike a true virus, it cannot replicate itself.
Trojan horse virus
A collection of the most recent web pages and files downloaded from the web. The files are stored in a folder cache so subsequent requests are retrieved from a local hard disk. When the user requests the same page, a request is sent to the website for the date. If it is newer than what is stored, a new page is downloaded. If not, it loads from the hard drive.
Temporary internet files
Spies on your computer. Can capture information like web browsing habits, email messages, usernames and passwords, and credit card information.
Spyware
Tricking or deceiving computer systems or other computer users. Done by hiding one’s identity or faking the identity of another us on the web.
Spoofing
Unsolicited bulk mail messages sent through email.
Spam
Also known as rogue security software. Uses fake error messages to lure you into buying a software program.
Scare ware
A hardware device that routes data from a local area network to another network connection.
Router
A collection of computer software, typically malicious, designed to allow access to areas of its software that would otherwise not be allowed.
Rootkit
Gaining access to the lowest level of an operating system.
Rooting
Also called an evil twin. A fraudulent wifi access point that appears to be legitimate set up to eavesdrop on wireless communications. The wireless LAN equivalent to phishing.
Rogue wifi hotspots
Functions as malevolent software that blocks victims access to computer and demand a ransom be paid.
Ransomeware