Term
|
Definition
Infects the partition table of the disk |
|
|
Term
|
Definition
Disguises itself as a legitimate program, using the name of that program |
|
|
Term
File Infector Virus with a different extension |
|
Definition
Generally infects files with .com or .exe extensions |
|
|
Term
|
Definition
Uses the internal workings of an application to perform malicious operations when opened |
|
|
Term
|
Definition
Virus that changes itself with each infection |
|
|
Term
|
Definition
virus capable of changing its code from generation to generation |
|
|
Term
|
Definition
Uses incrypted code to hide itself from virus protection |
|
|
Term
.com, .bat, .dll, .exe, .doc, .html, .mdb, .scr, .vbs, .xls, .zip |
|
Definition
10 file extensions that typically carry a virus |
|
|
Term
|
Definition
A computer program that hides in your machine until it is called to perform a certain task |
|
|
Term
|
Definition
An infection that will not activate until a certain condition is met such as a date or number of times a program is started |
|
|
Term
|
Definition
A self contained infection that can spread itself through network connections, email, IM |
|
|
Term
|
Definition
A back door program that allows remote access to a system |
|
|
Term
|
Definition
A computer in a network whose security is compromised running malicious code unknown to system users |
|
|
Term
Firmware, kernal, persistent, application, library |
|
Definition
|
|
Term
Used to take over hundreds or thousands of computers and send attackes to a single target |
|
Definition
|
|
Term
|
Definition
Unauthorized user gains more access by taking advantage of bugs in the code. |
|
|
Term
|
Definition
Everyday conversation used to learn personal information that might help guess passwords and user name |
|
|
Term
|
Definition
Minimum recommended pasword length |
|
|
Term
Upper case, lower case, numbers, symbols |
|
Definition
4 items that a password should contain to be secure |
|
|
Term
|
Definition
An attempt to break a password or encryption theme through simple repetition of attempts |
|
|
Term
|
Definition
Capturing an encrypted password file then comparing it to a list of everyday words to reveal passwords |
|
|
Term
|
Definition
Combination of dictionary and brute-force attack |
|
|
Term
|
Definition
One person oversees another entering password data. |
|
|
Term
|
Definition
An unauthorized user calls a help desk to get login credentials reset. |
|
|
Term
|
Definition
AN email scam that gets user to visit a website then enter personal information |
|
|
Term
|
Definition
A computer program that replicates itself within the infected system |
|
|