Term
|
Definition
A software program that delivers advertising content in a manner that is unexpected and unwanted by the user |
|
|
Term
|
Definition
Software code that gives access to a program or a service that circumvents normal security protections |
|
|
Term
|
Definition
A logical computer network of zombies under the control of an attacker |
|
|
Term
|
Definition
A malicious computer code that, like its biological counterpart, reproduces itself in an attack |
|
|
Term
|
Definition
|
|
Term
|
Definition
An attack that creates a fictitious character and then plays out the role of that person on a victim |
|
|
Term
|
Definition
Captures and stores each stroke that a user types on the computer's keyboard |
|
|
Term
|
Definition
Computer code that lies dormant until it is triggered by a specific logical event |
|
|
Term
|
Definition
Software that enters a computer system without the user's knowledge or consent and then performs an unwanted and usually harmful action |
|
|
Term
|
Definition
A phishing attack that automatically redirects the user to a fake site |
|
|
Term
|
Definition
Sending an email or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information |
|
|
Term
|
Definition
A set of software tools used by an attacker to hide the actions or presence of other types of malicious software |
|
|
Term
|
Definition
Watching an unauthorized user enter a security code on a keypad |
|
|
Term
|
Definition
A means of gathering information for an attack by relying on the weakness of individuals |
|
|
Term
|
Definition
|
|
Term
|
Definition
A phishing attack that targets only specific users |
|
|
Term
|
Definition
A variation of spam, which targets instant messaging users instead of email users |
|
|
Term
|
Definition
A general used to describe software that spies on users by gathering information without consent, thus violating their privacy |
|
|
Term
|
Definition
The act of unauthorized individuals entering a restricted access building following an authorized user |
|
|
Term
|
Definition
An executable program advertised as performing one activity , but actually does something else, or it may perform both the advertised and malicious activities |
|
|
Term
|
Definition
A phishing attack that uses a telephone call instead of using email |
|
|
Term
|
Definition
A phishing attack that targets only wealthy individuals |
|
|
Term
|
Definition
Horizontally splitting words so that they can still be read by the human eye |
|
|
Term
|
Definition
A malicious program designed to take advantage of a vulnerability in an application or an operating system in order to enter a computer and then self replicate to other computers |
|
|
Term
|
Definition
rapidly spreading its infection Cencealment Profit for its creators |
|
|
Term
|
Definition
|
|
Term
|
Definition
Appends itself to the end of the file Removes first three bytes and puts in a jump instruction and redirects control of virus |
|
|
Term
|
Definition
Executable code instead at the end of the file |
|
|
Term
|
Definition
Virus in split into several parts Parts are placed at random throughout the program |
|
|
Term
Virus performs tow actions |
|
Definition
Tries to reproduce Unloads a malicious payload and performs some action |
|
|
Term
How can a virus replicate? |
|
Definition
Only replicate itself on the host computer, it cannot automatically spread to another computer |
|
|
Term
|
Definition
file to attach human to tranpsort |
|
|
Term
|
Definition
|
|
Term
|
Definition
Written script known as macro |
|
|
Term
|
Definition
series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks |
|
|
Term
|
Definition
Loaded into RAM each time the computer is turned off and on |
|
|
Term
|
Definition
|
|
Term
|
Definition
Adds a program to the operating system that is a malicious copycat version to a legitimate program |
|
|
Term
|
Definition
Image spam divided into multiple images much like a biology textbook that has transparent plastic overlays of the different parts of the human body. Each piece of the message is divided and then layered to create a complete and legible message so that one spam email could be made up of a dozen layered GIF images |
|
|
Term
|
Definition
Uses speckling and different colors so that no two spam emails appear to be the same |
|
|
Term
|
Definition
digging through trash receptacles to find information that can be useful in an attack. |
|
|
Term
|
Definition
Trojans Rootkits Logic Bombs Backdoors |
|
|
Term
|
Definition
Botnets Spyware Adware keyloggers |
|
|
Term
Tricks of Social Engineering |
|
Definition
|
|