Malicious Code - CompTIA Security+ SY0-701 - 2.4

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/3

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 5:25 AM on 3/29/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

4 Terms

1
New cards

Exploiting a vulnerability

An attacker can use techniques like social engineering and default credentials.

2
New cards

Malicious Code

• The attackers use any opportunity

- The types of malicious code are varied and many

• Many different forms

- Executable, scripts, macro viruses, worms, Trojan horse, etc.

• Protection comes from many different sources

- Anti-malware

- Firewall

- Continuous updates and patches

- Secure computing habits

3
New cards

Malicious Code Examples

• WannaCry ransomware

- Executable exploited a vulnerability in Windows SMBv1

- Arbitrary code execution

• British Airways cross-site scripting

- 22 lines of malicious JavaScript code placed on checkout

pages

- Information stolen from 380,000 victims

• Estonian Central Health Database

- SQL injection

- Breached all healthcare information for an entire country

4
New cards

<>

<>

Explore top notes

note
Macbeth
Updated 1392d ago
0.0(0)
note
2.4 Stem Cell Dilemmas
Updated 768d ago
0.0(0)
note
casus 1
Updated 85d ago
0.0(0)
note
Chapter 33: Irritant Poisons
Updated 1085d ago
0.0(0)
note
Macbeth
Updated 1392d ago
0.0(0)
note
2.4 Stem Cell Dilemmas
Updated 768d ago
0.0(0)
note
casus 1
Updated 85d ago
0.0(0)
note
Chapter 33: Irritant Poisons
Updated 1085d ago
0.0(0)