unit 09: Threats to your digital assets Flashcards
identity theft?
when a thief steals personal info and poses as you in financial or legal transactions
hacker?
anyone who unlawfully breaks a computer system
3 types of hackers?
- white-hat hackers/ethical hacker - hacks to find system vulnerability
- grey-hat hacker - illegally hack a computer system to flaunt expertise but is harmless
- black-hat hackers - break computer systems to destroy/take illegal info
sniffer/packet analyzer?
program deployed by hackers to examine each packet and read its content
packet?
what data travels in when going through the internet
trojan horse?
a program that appears to be something useful/wanted while running something malicious int eh background
backdoor program?
gives hackers full access to someone’s computer
rootkit?
a program that gives an outsider remote control over a computer
zombie?
a computer that a hacker controls
DoS attack?
denial-of-service attack - when legitimate users are denied access to a computer system due to it being zombified
DDoS attack?
distributed denial-of-service attack - the distribution of DoS attacks from multiple Zombies
botnet?
a large group of devices that have been infected by robots/bots
robots/bots
software programs that run autonomously
exploit kits?
software programs that run on servers and search for vulnerabilities
logical ports?
virtual communication paths that allow computers to organize requests for info
virus?
a program that attaches itself to a host program and attempts to spread to another computer through file exchange
host program?
the program that a virus first attaches to
what does a virus do?
replicates itself and copies its code into files
is a virus a major threat?
no, but they slow down performances and display annoying messages
can Apple devices be affected by viruses?
yes
virus symptoms (6)
- sudden disappearance of icons/files
- takes you to places you don’t want to go
- odd pop-ups
- corrupted files
- program stop working properly
- system shuts down unexpectantly
boot-sector virus?
replicates itself onto a hard drive’s master boot record
master boot record?
a program that executes whenever a computer boots up
Logic bomb?
a virus that is triggered when a certain logical condition is met (like opening a file)
time bomb?
a virus that is triggered by the passage of time or on a certain date
worm?
an infection that is independent of a host and uses file transportation or network connection to spread
difference between worm and virus
worms don’t require a host to spread
script?
a mini-program that is executed without users knowledge - meant to collect personal info
macro virus?
a virus that attaches to docs that use macros
Melissa virus?
first major macro virus
macro?
short series of commands that usually automates repetitive tasks
email virus?
a virus that uses the address book in emails to spread
encryption virus/ransomware?
runs a program that searches for common file types holding them hostage asking for a ransom to unlock them
polymorphic virus?
changes its own code to avoid detection - master of disguise
multi-partite virus?
infect multiple file types to confuse antivirus