Term
|
Definition
Attaches itself to legitimate programs and then creates programs with a different file extension. |
|
|
Term
|
Definition
A virus that attaches itself to a macro and can infect documents and spead through email. |
|
|
Term
|
Definition
The fastest growing exploitation today. |
|
|
Term
|
Definition
Attacks your system in many differnt ways. |
|
|
Term
|
Definition
Modifies other programs and databases. All infected applications must be reinstalled to fix it. |
|
|
Term
|
Definition
Changes form, even encrypting parts of itself to avoid detection. |
|
|
Term
|
Definition
Covers itself with code that makes the important parts hard to detect. |
|
|
Term
|
Definition
Attacks or bypasses antivirus software. An anti-antivirus. |
|
|
Term
|
Definition
Hides from applications. May attach itself to the boot sector of the hard drive. |
|
|
Term
Update software, use Antivirus software and educate users. |
|
Definition
Name the three most important methods to avoid getting malware. |
|
|
Term
|
Definition
An application is used to create an entrance for the attacker. For instance, it might allow a certain username to have administrative privileges |
|
|
Term
|
Definition
An attack that exploits maintenance hooks. |
|
|
Term
|
Definition
An attack where something or someone masquerades as something else. |
|
|
Term
|
Definition
An attack where data is made to look like it came from a trusted host. |
|
|
Term
|
Definition
Software is put between the server and user to intercept data. |
|
|
Term
|
Definition
An attack where information, such as user name, password, or certificate, is captured and resubmitted. |
|
|
Term
|
Definition
Account attacked repeatedly to try to guess the password. |
|
|
Term
|
Definition
A password guessing attack without a dictionary. |
|
|
Term
|
Definition
A password guessing attack, which can be automated, that uses a dictionary of commonly used passwords |
|
|
Term
|
Definition
An attack that uses a ping of death or a buffer overflow. |
|
|
Term
Distributed Denial of Service Attack |
|
Definition
|
|
Term
|
Definition
Allows process to be run that are hidden from the task manager |
|
|
Term
|
Definition
Uses a Key Distribution Center |
|
|
Term
WiFi Protected Access (WPA2 is better) |
|
Definition
|
|
Term
Wireless Transport Layer Security |
|
Definition
|
|
Term
Vista Enterprise and Ultimate |
|
Definition
What versions of windows does Bitlocker work with |
|
|
Term
|
Definition
What is HTML for wireless |
|
|
Term
Encryption, Secure Hash Algorithm |
|
Definition
|
|
Term
Encryption Message Digest Algorithm MD5, MD4, MD2 |
|
Definition
|
|
Term
Trusted Platform Module A chip to help create hash keys |
|
Definition
|
|
Term
No write up or read down so data can't mix |
|
Definition
|
|
Term
Can't read up or write down, not concerned with data integrity |
|
Definition
Define the Bell-LA Module |
|
|
Term
Uses different applications to read, and write |
|
Definition
Define Clark-Wilson Model |
|
|
Term
|
Definition
Occurs when an attacker takes control of a network session |
|
|
Term
|
Definition
Sends a ping to a group of hosts in a network, that ping is echoed back from the hosts and overwhelmes the network. |
|
|
Term
|
Definition
Two extentions to disallow in attachments |
|
|
Term
Windows 2000 = ERD, Windows XP and Vista used ARD |
|
Definition
Which versions of windows uses ERD and ARD |
|
|
Term
|
Definition
Uses an ICMP packet to carry malicious code. |
|
|
Term
|
Definition
Sends packets to a server without an end packet thus filling up the server buffer and denying service to the server |
|
|
Term
|
Definition
Uses maintenance protocol to overload a server |
|
|