click below
click below
Normal Size Small Size show me how
securityCHpt2
terms
| Question | Answer |
|---|---|
| two types of spreading malware | viruses and worms |
| biological virus | agent that reproduces inside a cell |
| malware | refers to a wide variety of damaging or annoying software programs |
| virus | malicious computer code that reproduces itself on the same pc |
| ways in which a virus enters a program | appender infection |
| ways in which a virus enters a program | swiss cheese infection |
| ways in which a virus enters a program | split infection |
| malware | malicious software |
| malware objectives | infecting systems |
| malware objectives | concealing its purpose |
| malware objectives | making profit |
| program virus | infects program executable files |
| macro virus | written in a script,set of instructions |
| resident virus | loaded into random access memory |
| boot virus | infects the master boot record |
| companion virus | adds a program to the operating system that is a malicious copycat version to a legitimate program |
| worm | malicious program designed to take advantage of a vulnerability in an application to enter a pc |
| trojan horse | executable program advertised as performing one activity but does something else |
| virus infection methods | appender infection |
| appender infection | adds itself to the end of a file |
| viruses | insert code into file |
| worms | exploit vulnerabilities in an application |
| virus | self replicates on only local pc |
| worm | self replicate between computers |
| trojan | installed on the pc with users knowledge |
| actions that viruses have performed | computer crashes |
| actions that viruses have performed | erased files from hard drive |
| actions that viruses have performed | turn off security settings |
| actions that viruses have performed | reformat hard disk |
| actions that viruses have performed | make multiple copies consume hard drive |
| virus needs two carriers | a file to which it attached |
| virus needs two carriers | a human to transport it to others |
| concealing malware includes | trojans |
| concealing malware includes | rootkits |
| concealing malware includes | logic bombs |
| concealing malware includes | backdoors |
| rootkit | set of software tools used by an attacker to hide the actions or presence of other types of malicious software |
| root | highest level of privileges available in unix |
| two steps in removing a rootkit | erase the rootkit |
| two steps in removing a rootkit | the portions of the os programs and files that were altered must be replaced with the original files |
| only safe and foolproof way to handle a rootkit infection | reformat the hard drive and reinstall the operating system |
| logic bomb | computer code that lies dormant until it is triggered by a specific logical event |
| backdoor | software code that gives access to a program or service that circumvents any normal security protections |
| rootkits | hide or remove traces of log in records,log entries |
| infected robot bot pc | program that will allow the infected computer to be placed under the remote control of an attacker |
| zombie | infected robot pc |
| botnet | a logical network of zombies under control of an attacker |
| bot herder | |
| internet relay chat | |
| types of botnet attacks | spamming |
| types of botnet attacks | spreading malware |
| types of botnet attacks | attacking irc networks |
| types of botnet attacks | manipulating online polls |
| types of botnet attacks | denying services |
| technologies used by spyware | automatic download software |
| technologies used by spyware | passive tracking technologies |
| technologies used by spyware | system modifying software |
| technologies used by spyware | tracking software |
| spyware | software that spies on users by gathering information without their consent |
| malware that spreads | |
| malware that conceals | |
| botnet | program that allows it to be remotely controlled by an attacker |
| malware that profits | |
| negative effects of spyware | slow pc performance |
| negative effects of spyware | system instability |
| negative effects of spyware | new browser toolbars or menus |
| negative effects of spyware | new shortcuts |
| negative effects of spyware | hijacked home page |
| negative effects of spyware | increased pop ups |
| adware | program that delivers advertising content in a manner that is unexpected and unwanted by a user |
| keylogger | captures and stores each keystroke that a user types |
| keylogger can be | small hardware device or a software program |
| software keyloggers | programs installed on the computer that silently capture sensitive information |
| software keyloggers | do not require physical access |
| hardware keyloggers | physically install and removed later |
| social engineering | means of gathering information for an attack by reling on the weakness of individuals |
| social engineering psychological approaches | impersonation |
| social engineering psychological approaches | phishing |
| social engineering psychological approaches | spam |
| social engineering psychological approaches | hoaxes |
| variations on phishing attacks | pharming |
| variations on phishing attacks | spear phishing |
| variations on phishing attacks | whaling |
| variations on phishing attacks | vishing |
| phishing | sending an email or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user in surrendering private info |
| pharming | automatically redirects the user to the fake site |
| spear phishing | emails that targets specific users |
| whaling | targets only wealthy individuals |
| vishing | phishing attack that uses a phone call instead of email |
| spam | unsolicited email |
| hoax | a false warning |
| dumpster diving | digging thru trash receptacles to find info |
| tailgating | unauthorized person enters a building by following an authorized person |
| spim | targets instant messaging users instead of email users |
| piggybacking | unauthorized person enters a building by following an authorized person |
| shoulder surfing | watching an authorized user enter a security code on a keypad |
| malware that spreads | viruses |
| malware that spreads | worms |
| malware that conceals | trojans |
| malware that conceals | rootkits |
| malware that conceals | logic bombs |
| malware that conceals | backdoors |
| malware that profits | botnets |
| malware that profits | spyware |
| malware that profits | adware |
| malware that profits | keyloggers |
| social engineering attacks | impersonation |
| social engineering attacks | phishing |
| social engineering attacks | spam |
| social engineering attacks | hoaxes |
| social engineering attacks | pharming |
| social engineering attacks | spear phishing |
| social engineering attacks | whaling |
| social engineering attacks | vishing |
| most common physical procedure attacks | dumpster diving |
| most common physical procedure attacks | tailgating |
| types of spamming | gif layering |
| types of spamming | word splitting |
| types of spamming | geometric variance |
| types of spamming | image spam |
| dumpster diving items | calendars |
| dumpster diving items | memos |
| dumpster diving items | phone directories |
| dumpster diving items | organizational charts |
| dumpster diving items | policy manuals |
| dumpster diving items | system manuals |