acronyms Flashcards
(73 cards)
pluggin
A component that adds a specific feature to software. Also referred to as an extension. example face ID on iphone
feature
A distinctive characteristic of software or hardware.
platform
The environment in which a piece of software is executed. It may be the hardware, operating system, a web browser, or other underlying software.
For example, Microsoft Windows is a platform for Microsoft Word.
operating system (OS):
Software that manages the computer hardware and software. It’s a system that sits between the applications and hardware.
Microsoft Windows is an example of an operating system.
utilities:
Applications designed to help analyze, configure, optimize, or maintain a computer. Unlike application software (which focuses on benefiting the user), utilities are used to support the computer.
Applications (apps)
A type of software that allows a user to perform specific tasks and activities.
advanced persistent threat:
Also known as APT, is a network attack in which an unauthorized person gains access to a network and stays there undetected for a long period of time. The bad guy’s goal is to go undetected and steal data, rather than cause damage to the network or organization.
Zero-Day
the good guys had no warning; they had “zero-days” to do something about it. Because the bad guys exploited a security vulnerability before the good guys were aware of the security vulnerability.
Exploit
Software or code—usually malicious—that takes advantage of a flaw or Security vulnerability. The purpose is to cause unintended or unanticipated behavior to occur with the software or hardware. Such behavior would be unauthorized access or control of a computer, or denial-of-service (DoS).
security vulnerability
A weakness on a network, computer, or software which allows a bad guy to gain access. A security vulnerability has three elements:
1).a flaw,
2). access to the flaw,
3). and capability to exploit that flaw.
DoS attack
(Denial of Service) Bombarding the system to overload the computer to prevent users from getting on the site. When the attacks come from multiple sources, it’s called DDoS, “distributed denial-of-service.”
Data Breach
The intentional or unintentional release of secure information to an untrusted environment. Other terms for events like this are: unintentional information disclosure, data leak, and data spill.
botnet
Short for “robot network,” it’s a collection of software robots, or “bots,” that live on infected computers, and are controlled by the bad guys. Botnets do many bad things like spew out spam, attack other computers, or send back confidential data to the botnet controller.
Rootkit
Malicious code that loads into the early loading stages of a computer. The code hides itself from the operating system and other applications that load in the later stages, like antivirus and system utilities. This gives the bad guy full access to alter the system.
Ransom ware
Vicious malware that locks users out of their devices or blocks access to files until a sum of money or ransom is paid. Attacks cause downtime, data loss, possible intellectual property theft, and data breaches. Ransomware is also referred to as “cryptoware.”
How it works: Once the malware is on the machine, it starts to encrypt all the data files it can find on the computer and on any computers it can access within the network.
Malware
Malicious software. Short for the term “malicious software.” It’s an umbrella term used to refer to the various types of viruses, worms and trojans, etc. Most malware is installed without the infected person ever realizing it.
Virus
A malicious computer program that infects a file. A true virus can only spread from one computer to another when its host (infected file) is sent to the target computer.
The word “virus” is incorrectly used as an umbrella term for many flavors of viruses, worms and trojans, etc.
worm
A self-replicating computer program. It sends copies of itself to other computers, and may do so without any user intervention. Unlike a virus, it doesn’t need to attach itself to an existing file. Worms almost always cause at least some harm to the network.
Trojan malware
Malware that is designed to make you think you’re performing a task that you want when your’e really letting a hacker in or downloading malicious software.
WPT
Weak Password Test- Checks their active directory for several different types of weak passwords
USB
Universal Serial Bus- we also have a test that downloads software onto the users usb and they leave it in the office to see who plugs it in and who allows macros which is a mini program. then they are sent results after 7 days.
SMPT
Social media Phishing Test- Similar to a PST PRT see which users are likely to fall for social media related phishing attacks.
User selections either facebook, linked in, twitter, and then a landing page either one that reveals its a simulated phising or a login page for their login information for the social media platform. report will show how many people clicked on the link and how many people actually entered login information.
SMS
Short Message Service-a text message. there is also a smishing: which is sms phising
SMB
Small and Medium Businesses