• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/18

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

18 Cards in this Set

  • Front
  • Back
Virus

us a set of malicious code that attaches itself to the host application
Specific Characteristics of a Virus

Replication Mechanism


Activation mechanism


Objective mechanism

Virus Hoaxes
a viral hoax is a message that tell of some pending doom from a virus that does not exist.
Worms

are a self replicating malware that travel throughout a network. They do not need to be executed to run.
Trojan Horse
A type of Malware that looks like something useful but is malicious.
botnet

is a network of private computer that are infected with malware and controlled without the owners knowledge.
Logic bomb

a string of code embedded in an application or script that will execute in response to an event



Rootkit
a group of programs that hide the fact that a system has been infected or compromised by malicious code
Spim

Spam using an instant message
Spyware
is malicious software installed on a users system with the intent of taking control and sending information to a third party.
Privacy-invasive software

software that tries to separate users from their money using data harvesting techniques
To be most effective Malware defense should take place on .....


endpoints


servers


and firewalls

Signature based detection
virus and malware detection through pattern recognition
Heuristic-based Detection
virus and malware detection of unknown files that are not signature based.
Social Engineering

The use of social tactics to gain information
spear Phishing

is a type of Phishing that is used to target a small group of people of even an individual
Whaling

is spear phishing for high level executives.
Vishing

a form of Phishing that uses the phone system of VoIP