Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

securityCHpt2

terms

QuestionAnswer
two types of spreading malware viruses and worms
biological virus agent that reproduces inside a cell
malware refers to a wide variety of damaging or annoying software programs
virus malicious computer code that reproduces itself on the same pc
ways in which a virus enters a program appender infection
ways in which a virus enters a program swiss cheese infection
ways in which a virus enters a program split infection
malware malicious software
malware objectives infecting systems
malware objectives concealing its purpose
malware objectives making profit
program virus infects program executable files
macro virus written in a script,set of instructions
resident virus loaded into random access memory
boot virus infects the master boot record
companion virus adds a program to the operating system that is a malicious copycat version to a legitimate program
worm malicious program designed to take advantage of a vulnerability in an application to enter a pc
trojan horse executable program advertised as performing one activity but does something else
virus infection methods appender infection
appender infection adds itself to the end of a file
viruses insert code into file
worms exploit vulnerabilities in an application
virus self replicates on only local pc
worm self replicate between computers
trojan installed on the pc with users knowledge
actions that viruses have performed computer crashes
actions that viruses have performed erased files from hard drive
actions that viruses have performed turn off security settings
actions that viruses have performed reformat hard disk
actions that viruses have performed make multiple copies consume hard drive
virus needs two carriers a file to which it attached
virus needs two carriers a human to transport it to others
concealing malware includes trojans
concealing malware includes rootkits
concealing malware includes logic bombs
concealing malware includes backdoors
rootkit set of software tools used by an attacker to hide the actions or presence of other types of malicious software
root highest level of privileges available in unix
two steps in removing a rootkit erase the rootkit
two steps in removing a rootkit the portions of the os programs and files that were altered must be replaced with the original files
only safe and foolproof way to handle a rootkit infection reformat the hard drive and reinstall the operating system
logic bomb computer code that lies dormant until it is triggered by a specific logical event
backdoor software code that gives access to a program or service that circumvents any normal security protections
rootkits hide or remove traces of log in records,log entries
infected robot bot pc program that will allow the infected computer to be placed under the remote control of an attacker
zombie infected robot pc
botnet a logical network of zombies under control of an attacker
bot herder
internet relay chat
types of botnet attacks spamming
types of botnet attacks spreading malware
types of botnet attacks attacking irc networks
types of botnet attacks manipulating online polls
types of botnet attacks denying services
technologies used by spyware automatic download software
technologies used by spyware passive tracking technologies
technologies used by spyware system modifying software
technologies used by spyware tracking software
spyware software that spies on users by gathering information without their consent
malware that spreads
malware that conceals
botnet program that allows it to be remotely controlled by an attacker
malware that profits
negative effects of spyware slow pc performance
negative effects of spyware system instability
negative effects of spyware new browser toolbars or menus
negative effects of spyware new shortcuts
negative effects of spyware hijacked home page
negative effects of spyware increased pop ups
adware program that delivers advertising content in a manner that is unexpected and unwanted by a user
keylogger captures and stores each keystroke that a user types
keylogger can be small hardware device or a software program
software keyloggers programs installed on the computer that silently capture sensitive information
software keyloggers do not require physical access
hardware keyloggers physically install and removed later
social engineering means of gathering information for an attack by reling on the weakness of individuals
social engineering psychological approaches impersonation
social engineering psychological approaches phishing
social engineering psychological approaches spam
social engineering psychological approaches hoaxes
variations on phishing attacks pharming
variations on phishing attacks spear phishing
variations on phishing attacks whaling
variations on phishing attacks vishing
phishing sending an email or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user in surrendering private info
pharming automatically redirects the user to the fake site
spear phishing emails that targets specific users
whaling targets only wealthy individuals
vishing phishing attack that uses a phone call instead of email
spam unsolicited email
hoax a false warning
dumpster diving digging thru trash receptacles to find info
tailgating unauthorized person enters a building by following an authorized person
spim targets instant messaging users instead of email users
piggybacking unauthorized person enters a building by following an authorized person
shoulder surfing watching an authorized user enter a security code on a keypad
malware that spreads viruses
malware that spreads worms
malware that conceals trojans
malware that conceals rootkits
malware that conceals logic bombs
malware that conceals backdoors
malware that profits botnets
malware that profits spyware
malware that profits adware
malware that profits keyloggers
social engineering attacks impersonation
social engineering attacks phishing
social engineering attacks spam
social engineering attacks hoaxes
social engineering attacks pharming
social engineering attacks spear phishing
social engineering attacks whaling
social engineering attacks vishing
most common physical procedure attacks dumpster diving
most common physical procedure attacks tailgating
types of spamming gif layering
types of spamming word splitting
types of spamming geometric variance
types of spamming image spam
dumpster diving items calendars
dumpster diving items memos
dumpster diving items phone directories
dumpster diving items organizational charts
dumpster diving items policy manuals
dumpster diving items system manuals
Created by: cgeaski
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards