Shared Flashcard Set

Details

IT296 - Chapter 02
IT296 - Chapter 02 (Security+)
37
Computer Science
Undergraduate 2
04/23/2016

Additional Computer Science Flashcards

 


 

Cards

Term
Adware
Definition
A software program that delivers advertising content in a manner that is
unexpected and unwanted by the user.
Term
Armored Virus
Definition
A virus that goes to great lengths in order to avoid detection.
Term
Bot Herder
Definition
An attacker who controls a botnet.
Term
Botnet
Definition
A logical computer network of zombies under the control of an attacker.
Term
Command and Control
(C&C or C2)
Definition
The structure by which a bot herder gives instructions to zombies in a botnet.
Term
Computer Virus (Virus)
Definition
Malicious computer code that, like its biological counterpart, reproduces itself on the same computer.
Term
Dumpster Diving
Definition
The act of digging through trash receptacles to find information that can be useful in an attack.
Term
Hoax
Definition
A false warning designed to trick users into changing security settings on their
computer.
Term
Impersonation
Definition
A social engineering attack that involves masquerading as a real or
fictitious character and then playing out the role of that person on a victim.
Term
Keylogger
Definition
Software or a hardware device that captures and stores each keystroke that a
user types on the computer’s keyboard.
Term
Logic Bomb
Definition
Computer code that lies dormant until it is triggered by a specific logical event.
Term
Macro
Definition
A series of instructions that can be grouped together as a single command, often used to automate a complex set of tasks or a repeated series of tasks.
Term
Macro Virus
Definition
A computer virus that is written in a script known as a macro.
Term
Malware
Definition
Software that enters a computer system without the user’s knowledge or consent
and then performs an unwanted and usually harmful action.
Term
Metamorphic Malware
Definition
Malware that rewrites its own code and thus appears different each time it is executed.
Term
Oligomorphic malware
Definition
Malware that changes its internal code to one of a set number of predefined mutations whenever it is executed.
Term
Pharming
Definition
A phishing attack that automatically redirects the user to a fake site
Term
Phishing
Definition
Sending an email or displaying a web announcement that falsely claims to be
from a legitimate enterprise in an attempt to trick the user into surrendering private information.
Term
Polymorphic malware
Definition
Malware code that completely changes from its original form whenever it is executed.
Term
Program Virus
Definition
A computer virus that infects executable program files.
Term
Ransomware
Definition
Malware that prevents a user’s device from properly operating until a fee
is paid.
Term
RootKit
Definition
A set of software tools used by an attacker to hide the actions or presence of other types of malicious software.
Term
Shoulder Surfing
Definition
Watching an authorized user enter a security code on a keypad
Term
Social engineering
Definition
A means of gathering information for an attack by relying on the
weaknesses of individuals.
Term
Spam
Definition
Unsolicited Email
Term
Spear Phishing
Definition
A phishing attack that targets only specific users.
Term
Spim
Definition
A variation of spam, which targets instant messaging users instead of email users.
Term
Spyware
Definition
A general term used to describe software that spies on users by gathering information without consent
Term
Tailgating
Definition
When an unauthorized individual enters a restricted-access building by following an authorized user
Term
Trojan Horse (Trojan)
Definition
An executable program that is advertised as performing one activity
but which actually performs a malicious activity.
Term
Typo Squatting
Definition
Redirecting a user to a fictitious website based on a misspelling of the
URL. Also called URL hijacking.
Term
URL Hijacking
Definition
Redirecting a user to a fictitious website based on a misspelling of the URL.
Also called typo squatting.
Term
Vishing
Definition
A phishing attack uses telephone calls instead of emails.
Term
Watering Hole Attack
Definition
A malicious attack that is directed toward a small group of specific
individuals who visit the same website.
Term
Whaling
Definition
A phishing attack that targets only wealthy individuals.
Term
Worm
Definition
A malicious program designed to enter a computer via a network to take advantage
of a vulnerability in an application or an operating system
Term
Zombie
Definition
An infected computer that is under the remote control of an attacker.
Supporting users have an ad free experience!