Threats, Attacks, and Vulnerabilities 3 Flashcards
The trial software found exploits, but you need to buy the full package
Ransomware
More data is inserted into an application than expected
Buffer overflow
The reason why we shred and burn data is to prevent …
Dumpster diving
Someone standing behind you records your ATM transaction by using a smartphone
Shoulder surfing
A USB drive plugged into the back of your desktop logs keystrokes
Keylogger
This generates multiple popups
Adware
You have reinstalled the operating system, but this virus is still there
Rootkit
An attack on the CEO or a high‐level executive
Whaling
Someone willing to steal your trade secrets
Competitor
No knowledge or information is given to you
Black-box pen tester
Prevents pass-the-hash attacks
Kerberos
An untraceable virus
Zero‐day virus
May cause harm to your system
Intrusive scan
An attack on everyone using a popular trusted website
Watering-hole attack
Complete wireless payment transactions
Near field communication