Security+ Guide to Network Security Fundamentals Chapter 2 - Malware and Social Engineering Attacks

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/31

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

32 Terms

1
New cards

Virus

Malicious computer code that reproduces itself on the same computer.

2
New cards

Malware

Software that enters a computer system without the user’s knowledge or consent and then performs an unwanted and usually harmful action.

3
New cards

Worm

A malicious program that uses a computer network to replicate.

4
New cards

Remote Access Trojan (RAT)

A Trojan that also gives the threat agent unauthorized remote access to the victim’s computer by using specially configured communication protocols.

5
New cards

Trojan

An executable program that is advertised as performing one activity, but which also performs a malicious activity.

6
New cards

Ransomware

Malware that prevents a user’s device from properly and fully functioning until a fee is paid.

7
New cards

Keylogger

Spyware that silently captures and stores each keystroke that a user types on the computer’s keyboard.

8
New cards

Crypto-Malware

Malware that encrypts all the files on the device so that they cannot be opened and mines cryptocurrencies using the device.

9
New cards

Rootkit

Malware that hides its presence or the presence of other malware.

10
New cards

Spyware

Tracking software that is deployed without the consent or control of the user.

11
New cards

Adware

A software program that delivers advertising content in a manner that is unexpected and unwanted by the user.

12
New cards

Bot

An infected computer that is under the remote control of an attacker for the purpose of launching attacks, also known as a zombie.

13
New cards

Social Engineering

A means of gathering information for an attack by relying on the weaknesses of individuals.

14
New cards

Logic Bomb

Computer code that lies dormant until it is triggered by a specific logical event..

15
New cards

Backdoor

Software code that gives access to a computer, program or a service that circumvents any normal security protections.

16
New cards

Authority

A social engineering effectiveness principle in which an attack is directed by someone impersonating an authority figure or falsely citing their authority.

17
New cards

Intimidation

A social engineering effectiveness principle in which the victim is frightened and coerced by threat.

18
New cards

Consensus

A social engineering effectiveness principle in which the victim is influenced by what others do.

19
New cards

Scarcity

A social engineering effectiveness principle in which the victim is influenced by the idea that something is in short supply.

20
New cards

Familiarity

A social engineering effectiveness principle in which the victim is influenced by the claim that the victim is well-known and well-received.

21
New cards

Urgency

A social engineering effectiveness principle in which the victim is influenced by the claim that immediate action is needed.

22
New cards

Phishing

Sending an email or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information.

23
New cards

Impersonation

A social engineering attack that involves masquerading as a real or fictitious character and then playing out the role of that person on a victim.

24
New cards

Trust

A social engineering effectiveness principle in which the victim is influenced by confidence.

25
New cards

Spear Phishing

A phishing attack that targets only specific users.

26
New cards

Hoax

A false warning.

27
New cards

Whaling

A phishing attack that targets only wealthy individuals.

28
New cards

Vishing

A phishing attack that uses telephone calls instead of emails.

29
New cards

Watering Hole Attack

A malicious attack that is directed toward a smaller group of specific individuals by embedding malware in a website frequented by these individuals.

30
New cards

Dumpster Diving

The act of digging through trash receptacles to find information that can be useful in an attack.

31
New cards

Tailgating

When an unauthorized individual enters a restricted-access building by following an authorized user.

32
New cards

Shoulder Surfing

Watching a user enter secret information.