click below
click below
Normal Size Small Size show me how
Chapter 2
| Term | Definition |
|---|---|
| adware | A software program which delivers advertising content in a manner unexpected and unwanted by the user. |
| armored virus | A virus that goes to great lengths to avoid detection. |
| back door | Software code which gives access to a program or a service that circumvents normal security protections. |
| bot herder | An attacker who controls a botnet. |
| botnet | A logical computer network of zombies under control of an attacker. |
| command and control | the structure a bot herder uses to instruct zombies in a botnet. |
| computer virus | Malicious code that reproduces itself on the same computer. |
| dumpster diving | The act of digging through trash receptacles to find information that can be used in an attack. |
| hoax | A false warning designed to trick users into changing security settings on their computer. |
| impersonation | A social engineering attack that involves masquerading as a real or fictitious character and then playing out the role of that person on a victim. |
| keylogger | Software or hardware device that captures keystrokes. |
| logic bomb | computer code that lies dormant until triggered by a specific logical event. |
| macro | A series of instructions that can be grouped together as a single command, often used to automate a series of tasks. |
| macro virus | A computer virus which is written in a script known as a macro. |
| malware | Software that enters a computer without a user's knowledge or consent and then performs unwanted, possibly harmful, actions. |
| metamorphic malware | Malware that rewrites it's own code to appear different each time it is executed. |
| oligomorphic malware | Malware that changes its internal code to one of a set number of predefined mutations whenever it is executed. |
| pharming | A phishing attack which automatically redirects the user to a fake site |
| phishing | Sending an email or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick users into surrendering private info. |
| polymorphic malware | Malware code that completely changes from its original form each time it is executed. |
| program virus | A virus that infects program executables. |
| ransomware | Malware that prevents a user's device from properly operating until a fee is paid. |
| rootkit | A set of software used by an attacker to hide the presence or actions of other malicious software. |
| shoulder surfing | Watching an authorized user enter passwords or security codes. |
| social engineering | A means of gathering information for an attack by relying on the weakness of individuals. |
| spam | unsolicited emails. |
| spear phishing | A fishing attack that targets only specific users. |
| spim | Instant message spam. |
| spyware | A general term that describes software which spies on users. |
| tailgating | When an unauthorized individual enters a secure building by following an authorized person in. |
| Trojan | An executable program which purports to be useful, but actually installs malicious code. |
| typo squatting | taking advantage of misspelled URLs. |
| vishing | Telephone phishing attacks |
| watering hole attack | Directed toward a small group of individuals that use the same website. |
| whaling | phishing for fat chicks (or rich people) |
| worm | A malicious program designed to enter a PC via network to take advantage of a vulnerability in an application or operating system. |
| zombie | An infected computer that is under the remote control of an attacker. |