Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
18 Cards in this Set
- Front
- Back
Virus
|
us a set of malicious code that attaches itself to the host application |
|
Specific Characteristics of a Virus
|
Replication Mechanism Activation mechanism Objective mechanism |
|
Virus Hoaxes
|
a viral hoax is a message that tell of some pending doom from a virus that does not exist.
|
|
Worms
|
are a self replicating malware that travel throughout a network. They do not need to be executed to run. |
|
Trojan Horse
|
A type of Malware that looks like something useful but is malicious.
|
|
botnet
|
is a network of private computer that are infected with malware and controlled without the owners knowledge. |
|
Logic bomb
|
a string of code embedded in an application or script that will execute in response to an event |
|
Rootkit
|
a group of programs that hide the fact that a system has been infected or compromised by malicious code
|
|
Spim
|
Spam using an instant message |
|
Spyware
|
is malicious software installed on a users system with the intent of taking control and sending information to a third party.
|
|
Privacy-invasive software
|
software that tries to separate users from their money using data harvesting techniques |
|
To be most effective Malware defense should take place on .....
|
servers and firewalls |
|
Signature based detection
|
virus and malware detection through pattern recognition
|
|
Heuristic-based Detection
|
virus and malware detection of unknown files that are not signature based.
|
|
Social Engineering
|
The use of social tactics to gain information |
|
spear Phishing
|
is a type of Phishing that is used to target a small group of people of even an individual |
|
Whaling
|
is spear phishing for high level executives. |
|
Vishing
|
a form of Phishing that uses the phone system of VoIP |