Chapter 2 Flashcards
malware
Software designed to infiltrate a computer system and possibly damage it
without the user’s knowledge or consent.
virus
Code that runs on a computer without the user’s knowledge
worm
Code that runs on a computer without the user’s knowledge; a worm selfreplicates,
whereas a virus does not.
Trojan horse
An application that appears to perform desired functions but is actually
performing malicious functions behind the scenes.
ransomware
A type of malware that restricts access to a computer system, and demands
a ransom be paid.
spyware
A type of malicious software either downloaded unwittingly from a website or
installed along with some other third-party software.
adware
Type of spyware that pops up advertisements based on what it has learned
about the user.
grayware
applications that are behaving improperly
but without serious consequences; often describes types of spyware.
rootkit,
A type of software designed to gain administrator-level control over a computer
system without being detected
spam
The abuse of electronic messaging systems such as e-mail, broadcast media, and
instant messaging.
threat vector
The method a threat uses to gain access to a target computer.
attack vector
The path or means by which an attacker gains access to a computer.
typosquatting
A method used by attackers that takes advantage of user
typos when accessing websites.
botnet
group of compromised computers used to distribute malware across the
Internet
active
interception
Normally refers to placing a computer between the sender and
the receiver in an effort to capture and possibly modify information.