1/7
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Malware
Software design to exploit computer.
Trojan Horse
Program that acts like normal program but has malicious software.
Spyware
Program that captures user data.
Ransomware
Locks up data via encryption.
Type 0 hypervisors
Hardware-based solutions that provide support for virtual machine creation and management via firmware.
EX: VMware ESXi, Microsoft Hyper-V Server, XenServer
Type 1 hypervisors
Operating system like software built to provide virtualization.
EX: VMware ESX, Joyent SmartOS, Citrix XenServer
Type 2 hypervisors
Applications that run on standard operating system but provide VMM features to guest os.
EX: VMware workstation and fusion, Parallels Desktop, Oracle VirtualBox
Sniffing
Spoofing
Man-in-the-middle
Threats