Shared Flashcard Set

Details

CompTIA Security+
1.01 Differentiate Among Various System Security Threats
26
Internet/New Media
Undergraduate 3
04/02/2011

Additional Internet/New Media Flashcards

 


 

Cards

Term
A boot Sector Virus
Definition
Infects the partition table of the disk
Term
Companion virus
Definition
Disguises itself as a legitimate program, using the name of that program
Term
File Infector Virus with a different extension
Definition
Generally infects files with .com or .exe extensions
Term
Macro Virus
Definition
Uses the internal workings of an application to perform malicious operations when opened
Term
Polymorphic virus
Definition
Virus that changes itself with each infection
Term
Metamorphic virus
Definition
virus capable of changing its code from generation to generation
Term
Stealth virus
Definition
Uses incrypted code to hide itself from virus protection
Term
.com, .bat, .dll, .exe, .doc, .html, .mdb, .scr, .vbs, .xls, .zip
Definition
10 file extensions that typically carry a virus
Term
Trojan horse
Definition
A computer program that hides in your machine until it is called to perform a certain task
Term
Logic Bomb
Definition
An infection that will not activate until a certain condition is met such as a date or number of times a program is started
Term
Worm
Definition
A self contained infection that can spread itself through network connections, email, IM
Term
Rootkit
Definition
A back door program that allows remote access to a system
Term
Bot
Definition
A computer in a network whose security is compromised running malicious code unknown to system users
Term
Firmware, kernal, persistent, application, library
Definition
5 types of rootkits
Term
Used to take over hundreds or thousands of computers and send attackes to a single target
Definition
BotNet
Term
Privilege escalation
Definition
Unauthorized user gains more access by taking advantage of bugs in the code.
Term
Social Engineering
Definition
Everyday conversation used to learn personal information that might help guess passwords and user name
Term
6-8 characters
Definition
Minimum recommended pasword length
Term
Upper case, lower case, numbers, symbols
Definition
4 items that a password should contain to be secure
Term
Brute-force attack
Definition
An attempt to break a password or encryption theme through simple repetition of attempts
Term
Dictionary attack
Definition
Capturing an encrypted password file then comparing it to a list of everyday words to reveal passwords
Term
Hybrid attack
Definition
Combination of dictionary and brute-force attack
Term
Shoulder surfing
Definition
One person oversees another entering password data.
Term
Social Engineering
Definition
An unauthorized user calls a help desk to get login credentials reset.
Term
Phishing
Definition
AN email scam that gets user to visit a website then enter personal information
Term
Virus
Definition
A computer program that replicates itself within the infected system
Supporting users have an ad free experience!