Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
12 Cards in this Set
- Front
- Back
armored virus |
virus that is obfuscated to make it difficult to reverse engineer |
|
logic bomb |
executes in response to event |
|
worm |
self replicating malware, negatively affects network performance |
|
polymorphic malware |
malware that changes itself slightly on each iteration so that AV software cannot easily detect it |
|
botnet |
network of bots, often used for malicious purposes |
|
rootkits |
have system level access and can modify system files and system access |
|
spear phishing |
phishing that attacks specific target or group |
|
spim |
spam with instant messanging |
|
vishing |
phishing with VoIP |
|
heuristic based detection |
detection of malware with unknown signature by observing behavior |
|
most effective protection against adware |
pop up blockers |
|
drive by |
used to infect system with trojan |