securityCHpt2 Word Scramble
|
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Question | Answer |
two types of spreading malware | viruses and worms |
biological virus | agent that reproduces inside a cell |
malware | refers to a wide variety of damaging or annoying software programs |
virus | malicious computer code that reproduces itself on the same pc |
ways in which a virus enters a program | appender infection |
ways in which a virus enters a program | swiss cheese infection |
ways in which a virus enters a program | split infection |
malware | malicious software |
malware objectives | infecting systems |
malware objectives | concealing its purpose |
malware objectives | making profit |
program virus | infects program executable files |
macro virus | written in a script,set of instructions |
resident virus | loaded into random access memory |
boot virus | infects the master boot record |
companion virus | adds a program to the operating system that is a malicious copycat version to a legitimate program |
worm | malicious program designed to take advantage of a vulnerability in an application to enter a pc |
trojan horse | executable program advertised as performing one activity but does something else |
virus infection methods | appender infection |
appender infection | adds itself to the end of a file |
viruses | insert code into file |
worms | exploit vulnerabilities in an application |
virus | self replicates on only local pc |
worm | self replicate between computers |
trojan | installed on the pc with users knowledge |
actions that viruses have performed | computer crashes |
actions that viruses have performed | erased files from hard drive |
actions that viruses have performed | turn off security settings |
actions that viruses have performed | reformat hard disk |
actions that viruses have performed | make multiple copies consume hard drive |
virus needs two carriers | a file to which it attached |
virus needs two carriers | a human to transport it to others |
concealing malware includes | trojans |
concealing malware includes | rootkits |
concealing malware includes | logic bombs |
concealing malware includes | backdoors |
rootkit | set of software tools used by an attacker to hide the actions or presence of other types of malicious software |
root | highest level of privileges available in unix |
two steps in removing a rootkit | erase the rootkit |
two steps in removing a rootkit | the portions of the os programs and files that were altered must be replaced with the original files |
only safe and foolproof way to handle a rootkit infection | reformat the hard drive and reinstall the operating system |
logic bomb | computer code that lies dormant until it is triggered by a specific logical event |
backdoor | software code that gives access to a program or service that circumvents any normal security protections |
rootkits | hide or remove traces of log in records,log entries |
infected robot bot pc | program that will allow the infected computer to be placed under the remote control of an attacker |
zombie | infected robot pc |
botnet | a logical network of zombies under control of an attacker |
bot herder | |
internet relay chat | |
types of botnet attacks | spamming |
types of botnet attacks | spreading malware |
types of botnet attacks | attacking irc networks |
types of botnet attacks | manipulating online polls |
types of botnet attacks | denying services |
technologies used by spyware | automatic download software |
technologies used by spyware | passive tracking technologies |
technologies used by spyware | system modifying software |
technologies used by spyware | tracking software |
spyware | software that spies on users by gathering information without their consent |
malware that spreads | |
malware that conceals | |
botnet | program that allows it to be remotely controlled by an attacker |
malware that profits | |
negative effects of spyware | slow pc performance |
negative effects of spyware | system instability |
negative effects of spyware | new browser toolbars or menus |
negative effects of spyware | new shortcuts |
negative effects of spyware | hijacked home page |
negative effects of spyware | increased pop ups |
adware | program that delivers advertising content in a manner that is unexpected and unwanted by a user |
keylogger | captures and stores each keystroke that a user types |
keylogger can be | small hardware device or a software program |
software keyloggers | programs installed on the computer that silently capture sensitive information |
software keyloggers | do not require physical access |
hardware keyloggers | physically install and removed later |
social engineering | means of gathering information for an attack by reling on the weakness of individuals |
social engineering psychological approaches | impersonation |
social engineering psychological approaches | phishing |
social engineering psychological approaches | spam |
social engineering psychological approaches | hoaxes |
variations on phishing attacks | pharming |
variations on phishing attacks | spear phishing |
variations on phishing attacks | whaling |
variations on phishing attacks | vishing |
phishing | sending an email or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user in surrendering private info |
pharming | automatically redirects the user to the fake site |
spear phishing | emails that targets specific users |
whaling | targets only wealthy individuals |
vishing | phishing attack that uses a phone call instead of email |
spam | unsolicited email |
hoax | a false warning |
dumpster diving | digging thru trash receptacles to find info |
tailgating | unauthorized person enters a building by following an authorized person |
spim | targets instant messaging users instead of email users |
piggybacking | unauthorized person enters a building by following an authorized person |
shoulder surfing | watching an authorized user enter a security code on a keypad |
malware that spreads | viruses |
malware that spreads | worms |
malware that conceals | trojans |
malware that conceals | rootkits |
malware that conceals | logic bombs |
malware that conceals | backdoors |
malware that profits | botnets |
malware that profits | spyware |
malware that profits | adware |
malware that profits | keyloggers |
social engineering attacks | impersonation |
social engineering attacks | phishing |
social engineering attacks | spam |
social engineering attacks | hoaxes |
social engineering attacks | pharming |
social engineering attacks | spear phishing |
social engineering attacks | whaling |
social engineering attacks | vishing |
most common physical procedure attacks | dumpster diving |
most common physical procedure attacks | tailgating |
types of spamming | gif layering |
types of spamming | word splitting |
types of spamming | geometric variance |
types of spamming | image spam |
dumpster diving items | calendars |
dumpster diving items | memos |
dumpster diving items | phone directories |
dumpster diving items | organizational charts |
dumpster diving items | policy manuals |
dumpster diving items | system manuals |
Created by:
cgeaski
Popular Computers sets