Section 6, 7, 9

0.0(0)
studied byStudied by 1 person
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/33

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

34 Terms

1
New cards

Ransomware

A type of malware that locks or encrypts files and demands payment to unlock them

2
New cards

Trojan horse

Malware disguised as legitimate software but contains malicious code

3
New cards

RAT (Remote Access Trojan)

A Trojan that allows remote control of the infected system

4
New cards

Worm

A standalone malware that self-replicates and spreads across networks

5
New cards

Spyware

Malware that secretly gathers user data without consent

6
New cards

Adware

Displays unwanted ads, may come bundled with other software

7
New cards

Keylogger

A type of spyware that records keystrokes to steal data

8
New cards

Logic bomb

Malicious code triggered by a specific event or condition

9
New cards

Rootkit

Software that hides its presence to maintain privileged access

10
New cards

Botnet

A network of infected machines controlled by an attacker

11
New cards

PUP (Potentially Unwanted Program)

Unwanted software installed without full user consent, often bundled

12
New cards

Bloatware

Pre-installed software that slows system performance

13
New cards

Fileless malware

Malware that operates in memory to avoid detection

14
New cards

Polymorphic malware

Malware that changes code to avoid detection

15
New cards

Data at rest

Data stored on a device (e.g., hard drive or flash drive)

16
New cards

Data in transit

Data moving through a network (e.g., email or web traffic)

17
New cards

Data in use

Data actively being processed by applications

18
New cards

Tokenization

Replacing sensitive data with non-sensitive placeholders

19
New cards

Data masking

Hiding real data with altered content for testing/training

20
New cards

Classification

Tagging data based on sensitivity level (e.g., public, confidential)

21
New cards

DLP (Data Loss Prevention)

Technology used to detect and prevent unauthorized data transfers

22
New cards

Obfuscation

Making code/data harder to understand to reduce exploitation

23
New cards

Anonymization

Removing personal identifiers from data completely

24
New cards

Pseudonymization

Replacing personal data with pseudonyms to protect privacy

25
New cards

Risk

Probability that a threat will exploit a vulnerability

26
New cards

Threat

Potential cause of an unwanted impact to a system

27
New cards

Vulnerability

Weakness in a system that can be exploited

28
New cards

Likelihood

The chance that a threat will actually exploit a vulnerability

29
New cards

Impact

Effect a threat exploiting a vulnerability would have

30
New cards

Risk assessment

Process of identifying and analyzing risks to systems

31
New cards

Risk register

A document listing known risks, impact, and mitigation strategies

32
New cards

Risk appetite

The amount of risk an organization is willing to accept

33
New cards

Risk tolerance

The acceptable variation in outcomes related to risk

34
New cards