Busy. Please wait.
or

show password
Forgot Password?

Don't have an account?  Sign up 
or

Username is available taken
show password

why


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
We do not share your email address with others. It is only used to allow you to reset your password. For details read our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Remove ads
Don't know
Know
remaining cards
Save
0:01
To flip the current card, click it or press the Spacebar key.  To move the current card to one of the three colored boxes, click on the box.  You may also press the UP ARROW key to move the card to the "Know" box, the DOWN ARROW key to move the card to the "Don't know" box, or the RIGHT ARROW key to move the card to the Remaining box.  You may also click on the card displayed in any of the three boxes to bring that card back to the center.

Pass complete!

"Know" box contains:
Time elapsed:
Retries:
restart all cards




share
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

securityCHpt2

terms

QuestionAnswer
two types of spreading malware viruses and worms
biological virus agent that reproduces inside a cell
malware refers to a wide variety of damaging or annoying software programs
virus malicious computer code that reproduces itself on the same pc
ways in which a virus enters a program appender infection
ways in which a virus enters a program swiss cheese infection
ways in which a virus enters a program split infection
malware malicious software
malware objectives infecting systems
malware objectives concealing its purpose
malware objectives making profit
program virus infects program executable files
macro virus written in a script,set of instructions
resident virus loaded into random access memory
boot virus infects the master boot record
companion virus adds a program to the operating system that is a malicious copycat version to a legitimate program
worm malicious program designed to take advantage of a vulnerability in an application to enter a pc
trojan horse executable program advertised as performing one activity but does something else
virus infection methods appender infection
appender infection adds itself to the end of a file
viruses insert code into file
worms exploit vulnerabilities in an application
virus self replicates on only local pc
worm self replicate between computers
trojan installed on the pc with users knowledge
actions that viruses have performed computer crashes
actions that viruses have performed erased files from hard drive
actions that viruses have performed turn off security settings
actions that viruses have performed reformat hard disk
actions that viruses have performed make multiple copies consume hard drive
virus needs two carriers a file to which it attached
virus needs two carriers a human to transport it to others
concealing malware includes trojans
concealing malware includes rootkits
concealing malware includes logic bombs
concealing malware includes backdoors
rootkit set of software tools used by an attacker to hide the actions or presence of other types of malicious software
root highest level of privileges available in unix
two steps in removing a rootkit erase the rootkit
two steps in removing a rootkit the portions of the os programs and files that were altered must be replaced with the original files
only safe and foolproof way to handle a rootkit infection reformat the hard drive and reinstall the operating system
logic bomb computer code that lies dormant until it is triggered by a specific logical event
backdoor software code that gives access to a program or service that circumvents any normal security protections
rootkits hide or remove traces of log in records,log entries
infected robot bot pc program that will allow the infected computer to be placed under the remote control of an attacker
zombie infected robot pc
botnet a logical network of zombies under control of an attacker
bot herder
internet relay chat
types of botnet attacks spamming
types of botnet attacks spreading malware
types of botnet attacks attacking irc networks
types of botnet attacks manipulating online polls
types of botnet attacks denying services
technologies used by spyware automatic download software
technologies used by spyware passive tracking technologies
technologies used by spyware system modifying software
technologies used by spyware tracking software
spyware software that spies on users by gathering information without their consent
malware that spreads
malware that conceals
botnet program that allows it to be remotely controlled by an attacker
malware that profits
negative effects of spyware slow pc performance
negative effects of spyware system instability
negative effects of spyware new browser toolbars or menus
negative effects of spyware new shortcuts
negative effects of spyware hijacked home page
negative effects of spyware increased pop ups
adware program that delivers advertising content in a manner that is unexpected and unwanted by a user
keylogger captures and stores each keystroke that a user types
keylogger can be small hardware device or a software program
software keyloggers programs installed on the computer that silently capture sensitive information
software keyloggers do not require physical access
hardware keyloggers physically install and removed later
social engineering means of gathering information for an attack by reling on the weakness of individuals
social engineering psychological approaches impersonation
social engineering psychological approaches phishing
social engineering psychological approaches spam
social engineering psychological approaches hoaxes
variations on phishing attacks pharming
variations on phishing attacks spear phishing
variations on phishing attacks whaling
variations on phishing attacks vishing
phishing sending an email or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user in surrendering private info
pharming automatically redirects the user to the fake site
spear phishing emails that targets specific users
whaling targets only wealthy individuals
vishing phishing attack that uses a phone call instead of email
spam unsolicited email
hoax a false warning
dumpster diving digging thru trash receptacles to find info
tailgating unauthorized person enters a building by following an authorized person
spim targets instant messaging users instead of email users
piggybacking unauthorized person enters a building by following an authorized person
shoulder surfing watching an authorized user enter a security code on a keypad
malware that spreads viruses
malware that spreads worms
malware that conceals trojans
malware that conceals rootkits
malware that conceals logic bombs
malware that conceals backdoors
malware that profits botnets
malware that profits spyware
malware that profits adware
malware that profits keyloggers
social engineering attacks impersonation
social engineering attacks phishing
social engineering attacks spam
social engineering attacks hoaxes
social engineering attacks pharming
social engineering attacks spear phishing
social engineering attacks whaling
social engineering attacks vishing
most common physical procedure attacks dumpster diving
most common physical procedure attacks tailgating
types of spamming gif layering
types of spamming word splitting
types of spamming geometric variance
types of spamming image spam
dumpster diving items calendars
dumpster diving items memos
dumpster diving items phone directories
dumpster diving items organizational charts
dumpster diving items policy manuals
dumpster diving items system manuals
Created by: cgeaski