Malware/Attacks Flashcards Preview

Kierra Security > Malware/Attacks > Flashcards

Flashcards in Malware/Attacks Deck (18):
1

Worm

Worm

Like a virus but it self replicates (meaning it makes copies of itself) a virus can’t

A worm also moves by itself where as a virus needs someone or something to execute it.

Think of it like this

a worm can move alone on the ground

A virus like the flu has to be spread by a person

2

Trojan

Malware that looks like it’s being helpful but really is conducting malicious functions behind the scenes


For example a program says it is cleaning your pc but really making changes to your OS

3

Spyware

Collects information without users consent

4

Adware

Pop up advertisements based on your browsing habits

5

Rootkit

Software designed to gain administrator level control over a computer system


Difficult to detect because it loads before the operating system does

6

Spam

Abuse of email/ IM

Example phishing

7

Threat vector

Method a threat uses to access a target

8

Attack vector

The means by which an attacker gains access to a computer

9

Botnet

Master computer that controls zombies

Zombies are the individual compromised computers in the botnet


Think of it as : a network of bots (bot net)

10

Active interception

A computer is placed between a sender and receiver to capture information “eavesdropping”

11

Privilege Escalation

Exploiting a bug or design flaw to gain access to resources you wouldn’t have otherwise


You gain more privileges than you are supposed to sometimes even admin privileges

12

Backdoor

Used in computer programs to bypass normal authentication and other security mechanisms

13

Logic bomb

Code inserted into software that is meant to initiate a malicious function when certain criteria is met

14

Bluesnarfing

Unauthorized access or information from a computer wireless device through a Bluetooth connection

15

Bluejacking

Sending unwanted messages to Bluetooth enabled devices

Kinda like pop up advertisements

16

Buffer overflow

Process stores data outside of memory

17

Cross-site scripting

Exploits the trust a user’s browser has in a website through code injection

18

Directory traversal

Method of accessing unauthorized root directories