Threats, Attacks, and Vulnerabilities 3 Flashcards
The trial software found exploits, but you need to buy the full package
Ransomware
More data is inserted into an application than expected
Buffer overflow
The reason why we shred and burn data is to prevent …
Dumpster diving
A USB drive plugged into the back of your desktop logs keystrokes
Keylogger
You have reinstalled the operating system, but this virus is still there
Rootkit
Someone standing behind you records your ATM transaction by using a smartphone
Shoulder surfing
This generates multiple popups
Adware
No knowledge or information is given to you
Black-box pen tester
An untraceable virus
Zero‐day virus
Someone willing to steal your trade secrets
Competitor
An attack on the CEO or a high‐level executive
Whaling
Prevents pass-the-hash attacks
Kerberos
May cause harm to your system
Intrusive scan
An attack on everyone using a popular trusted website
Watering-hole attack
Complete wireless payment transactions
Near field communication
(NFC)