• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/23

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

23 Cards in this Set

  • Front
  • Back
Adware
A software program that delivers advertising content in a manner that is unexpected and unwanted by the user
Boot sector virus

infect computer systems by copying code either to theboot sector on a floppy disk or the partition table on a hard disk. Duringstartup, the virus is loaded into memory. Once in memory, the virus willinfect any non-infected disks accessed by the system.

Botnet
A logical computer network of zombies under the control of an attacker
File types that can be infected?

.DOCX, .XLSX Microsoft Office user documents
.EXE Executable program file
.MSI Microsoft installer file
.MSP Windows installer patch file
.SCR Windows screen saver
.CPL Windows Control Panel file
.MSC Microsoft Management Console file
.WSF Windows script file
.REG Windows registry file
.PS1 Windows PowerShell script

How are computer attacks different in this day and age?

*Availability and simplicity of attack tools


*Universally connected devices


*Greater sophistication of attacks


*Increased speed of attacks


*Faster detection of vulnerabilities


*Delays in security updating


*Weak security update distribution



Keylogger
Software or a hardware device that captures and stores each keystroke that a user types on the computer’s keyboard.
Logic Bomb
Computer code that lies dormant until it is triggered by a specific logical event.
Macro virus
A computer virus that is written in a script known as a macro.
Metamorphic virus
Malware that rewrites its own code and thus appears different each time it is executed
OSI Model

Provides recommended guide lines for creating software, not mandatory.


Application


Presentation


Session


Transport


Network


Data-Link


Physical

Packets

is the unit of data that is routed between an origin and a destination on the Internet or any other packet-switched network

Program virus
A computer virus that infects executable program files
Ransomware
Malware that prevents a user’s device from properly operating until a fee is paid
Spam
Unsolicited email
Split infection

some viruses split the malicious code itself into several parts (along
with one main body of code), and then these parts are placed at random positions
throughout the program code. To make detection even more difficult these parts may
contain unnecessary “garbage” code to mask their true purpose.

Spyware
A general term used to describe software that spies on users by gathering information without consent.
Watering hole
A malicious attack that is directed toward a small group of specific individuals who visit the same website.
What is a macro? Why is it significant to security?

1. A macro is a series of instructions
that can be grouped together as a single command. Often macros are used to automate a complex
set of tasks or a repeated series of tasks.





What is a rootkit and how does it work?
A set of software tools used by an attacker to hide the actions or presence of other types of malicious software.



is
a set of software tools used to hide the actions or presence of other types of software. This
software can be benign, like playing music CDs, or it can be malicious, such as Trojans,
viruses, or worms. Rootkits do this by changing the operating system to force it to ignore
their malicious files or activity. Rootkits also hide or remove all traces of evidence that may
reveal the malware, such as log entries

What is a virus?

is malicious computer code that, like its biological
counterpart, reproduces itself on the same computer. Strictly speaking a computer virus replicates
itself (or an evolved copy of itself) without any human intervention.

What is an Easter egg?



which refers to an undocumented, yet benign hidden feature that launches
by entering a set of special commands, key combinations, or mouse clicks.

Which Malware classifications exist?

Worms


Trojan Horse


Spyware


Aware


Ransomeware

Zombie
An infected computer that is under the remote control of an attacker.