Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
23 Cards in this Set
- Front
- Back
Adware
|
A software program that delivers advertising content in a manner that is unexpected and unwanted by the user
|
|
Boot sector virus
|
infect computer systems by copying code either to theboot sector on a floppy disk or the partition table on a hard disk. Duringstartup, the virus is loaded into memory. Once in memory, the virus willinfect any non-infected disks accessed by the system. |
|
Botnet
|
A logical computer network of zombies under the control of an attacker
|
|
File types that can be infected?
|
.DOCX, .XLSX Microsoft Office user documents |
|
How are computer attacks different in this day and age?
|
*Availability and simplicity of attack tools *Universally connected devices *Greater sophistication of attacks *Increased speed of attacks *Faster detection of vulnerabilities *Delays in security updating *Weak security update distribution |
|
Keylogger
|
Software or a hardware device that captures and stores each keystroke that a user types on the computer’s keyboard.
|
|
Logic Bomb
|
Computer code that lies dormant until it is triggered by a specific logical event.
|
|
Macro virus
|
A computer virus that is written in a script known as a macro.
|
|
Metamorphic virus
|
Malware that rewrites its own code and thus appears different each time it is executed
|
|
OSI Model
|
Provides recommended guide lines for creating software, not mandatory. Application Presentation Session Transport Network Data-Link Physical |
|
Packets
|
is the unit of data that is routed between an origin and a destination on the Internet or any other packet-switched network |
|
Program virus
|
A computer virus that infects executable program files
|
|
Ransomware
|
Malware that prevents a user’s device from properly operating until a fee is paid
|
|
Spam
|
Unsolicited email
|
|
Split infection
|
some viruses split the malicious code itself into several parts (along |
|
Spyware
|
A general term used to describe software that spies on users by gathering information without consent.
|
|
Watering hole
|
A malicious attack that is directed toward a small group of specific individuals who visit the same website.
|
|
What is a macro? Why is it significant to security?
|
1. A macro is a series of instructions |
|
What is a rootkit and how does it work?
|
A set of software tools used by an attacker to hide the actions or presence of other types of malicious software.
is |
|
What is a virus?
|
is malicious computer code that, like its biological |
|
What is an Easter egg?
|
which refers to an undocumented, yet benign hidden feature that launches |
|
Which Malware classifications exist?
|
Worms Trojan Horse Spyware Aware Ransomeware |
|
Zombie
|
An infected computer that is under the remote control of an attacker.
|