Term
click below
click below
Term
Normal Size Small Size show me how
chapter 2
chapter 2 terms and definitions
Term | Definition |
---|---|
adware | a software program that delivers advertising content in a manner that is unexpected and unwanted by the user |
armored virus | virus that goes to great lengths in order to avoid dectection |
backdoor | software code that gives access to a program or a service that circumvents normal security protections |
bot herder | an attacker that controls a botnet |
botnet | logical computer network of zombies under the control of an attacker |
command and control | the structure by which a bot herder gives instructions to zombies of a botnet |
computer virus | malicious computer code |
dumpster diving | the act of digging through trash receptacles to find information that can be useful in an attack |
hoax | false warning designed to trick users into changing settings on their computer |
impersonation | social engineering attack that involves masquerading as a real or fictitious character then playing out that role on a victim |
keylogger | software or hardware device that captures and stores each keystroke that a user types on the computer keyboard |
logic bomb | computer code that lies dormant until it is triggered by a specific logical event |
macro | series of instructions that can be grouped together as a single command |
macro virus | virus that is written in a script known as a macro |
malware | software that enters a computer system without the user's knowledge or consent and then performs an unwanted and usually harmful action |
metamorphic malware | malware that rewrites its own code and thus appears different each time it is executed |
oligomorphic malware | malware that changes its internal code to one of a set of numbers of predefined mutations whenever its executed |
pharming | phishing attack that automatically redirects a user to a fake site |
phishing | sending an email or displaying a web announcement that falsely claims to be legit in an attempt to trick the user into surrendering private information |
polymorphic malware | malware code that completely changes from its original state whenever it is executed |
program virus | virus that infects executable program files |
ransomware | malware that prevents a user's device from proprly operating until a fee is paid |
rootkit | set of software tools used by an attacker to hide the actions or presence of other types of vicious software |
shoulder surfing | watching an authorized user enter a security code on a keypad |
social engineering | means of gathering information for an attack by relying on the weakness of individuals |
spam | unsolicited email |
spear phishing | phishing attack that targets only specific users |
spim | variation of spam, which targets instant messaging users instead of emailing users |
spyware | general term for software that spies on users by gathering information without consent. |
tailgating | when an authorized individual enters a restricted area by following an authorized user |
trojan horse | executable program that is advertised as performing one action but which actually performs a malicious activity |
typo squatting | redirecting a user to a fictitious site based on a misspelling of the URL |
URL hijacking | same as typo squatting |
vishing | phishing attack that uses telephone |
watering hole attack | malicious attack that is directed towards a small group of individuals who visit the same site |
whaling | phishing attack that targets only wealthy individuals |
worm | malicious program designed to enter a computer via a network to take advantage of a vulnerability in an application or an operating system |
zombie | infected computer that is under the remote control of an attacker |