comp security exam 3 Flashcards
Malware
Malicious software designed to harm or exploit any programmable device or network.
Worm
Self-replicating malware that spreads across networks without user action.
Virus
Malware that attaches to files and spreads when the host file is executed.
Spyware
Software that secretly collects user information and sends it to a third party.
Wiper
Malware that deletes or “wipes” data to render systems unusable.
Denial of Service
Attack that overwhelms resources to make a service unavailable.
Backdoor
Hidden method for bypassing normal authentication to access systems.
Ransomware
Malware that encrypts data and demands payment for its release.
Infiltration
Initial compromise of a system by malware or attacker.
Exfiltration
Unauthorized transfer of data out of a compromised system.
Trigger (Logic Bomb)
Hidden code set to execute malicious action when specific conditions are met.
Dropper
multi-stage dropper
Bot
botnet
Keylogger
Software that records keystrokes to capture sensitive data.
Windows Hooks
API-level intercepts of OS events used by some malware to monitor activity.
Zero-day Vulnerability
Exploit
Zero-click Exploit
Exploit that requires no user interaction to compromise a device.
File Infector
Malware that infects and modifies executable files on disk.
USB and infected firmware
Malware embedded in USB device firmware to infect hosts.
Autorun
Feature that automatically executes code from removable media.
Data leakage
Unintentional or malicious exfiltration of sensitive data.
Macro Viruses
Viruses written in macro languages (e.g.
Social Engineering
Manipulating people into performing actions or divulging confidential information.
Deceptive download
Malicious software disguised as legitimate download.