Attacks, Threats, and Vulnerabilities Flashcards
(104 cards)
viruses
An unsolicited and unwanted malicious program
Crypto-malware
A malicious program that encrypts programs and files on the computer in order to extort money from the user
Ransomware
Denies access to a computer system or data until a ransom is paid. Can be spread through a phishing email or unknowingly infected website
Worm
A self-contained infection that can spread itself through networks, emails, and messages
Trojan
A form of malware that pretends to be a harmless application
Rootkit
backdoor program that allows full remote access to a system
Keylogger
A malicious program that saves all of the keystrokes of the infected machine.
Adware
A program that produces ads and pop ups using your browser, may replace the original browser and produce fake ads to remove the adware in order to download more malware
Spyware
Software that installs itself to spy on the infected machine, sends the stolen information over the internet back to the host machine
Bots
AI that when inside an infected machine performs specific actions as a part of a larger entity known as a botnet
RAT (Remote Access Trojan)
A remotely operated Trojan.
Logic bomb
A malicious program that lies dormant until a specific date or event occurs
Backdoor
Allows for full access to a system remotely
Phishing
Sending a false email pretending to be legitimate to steal valuable information from the user
Spear phishing
Attacks that target specific users
Whaling
An attack on a powerful or wealthy individual
Vishing
An attack through a phone or voice communications
Tailgating
Closely following individuals with keys to get access to secure areas
Impersonation
Taking on the identity of an individual to get access into the system or communications protocol
Dumpster diving
Going through a business’s or person’s trash to find thrown away valuable information or possessions
Shoulder surfing
Watching as a person enters information
Hoax
False information that deceives the user into compromising security by making them believe they are at risk
Watering hole attack
A security attack that targets a specific highly secured group by infecting a commonly visited website by the group’s members
Authority
The actor acts as an individual of authority