Cybersecurity and Malware: Viruses, Scanning, and Encryption Techniques

0.0(0)
Studied by 8 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/38

flashcard set

Earn XP

Description and Tags

Last updated 3:12 PM on 3/19/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

39 Terms

1
New cards

Common way for a virus to spread

Viruses commonly spread through infected files, email attachments, downloads, or network connections.

2
New cards

Armored Virus

An armored virus uses techniques that make it hard to analyze.

3
New cards

Sparse infector Virus

A sparse infector virus attempts to elude detection by performing its malicious activities only sporadically.

4
New cards

MacDefender Virus

A type of malware that targets Mac OS users, often disguised as legitimate antivirus software.

5
New cards

Mimail Virus

A computer worm that spreads via email and is known for its ability to spoof email addresses.

6
New cards

Flame Virus

A sophisticated cyber espionage malware that targets computers in the Middle East and is capable of extensive data collection.

7
New cards

Trojan Horse

A type of malware that disguises itself as legitimate software to trick users into installing it.

8
New cards

Virus Scanner Examples

Software applications designed to detect and remove viruses, such as Norton, McAfee, and Bitdefender.

9
New cards

Worms

Self-replicating malware that spreads across networks without the need for a host file.

10
New cards

Buffer-Overflow

A vulnerability that occurs when a program writes more data to a buffer than it can hold, potentially allowing code execution.

11
New cards

Penetration Testing

A simulated cyber attack on a computer system to evaluate its security and identify vulnerabilities.

12
New cards

Phreaking

The practice of manipulating telephone systems to make free calls or gain unauthorized access.

13
New cards

Passive Scanning

A method of monitoring network traffic without actively probing the network for information.

14
New cards

1024 well-known ports

Ports ranging from 0 to 1023 that are reserved for specific services and protocols on the internet.

15
New cards

Nmap

A network scanning tool used to discover hosts and services on a computer network.

16
New cards

SYN scan

A technique used in network scanning to determine which ports are open by sending SYN packets.

17
New cards

Nmap Flags

Options used in Nmap to modify its behavior, such as -sS for SYN scan or -O for OS detection.

18
New cards

Enumeration

The process of extracting detailed information about a system or network, often used in penetration testing.

19
New cards

SQL Injection

A code injection technique that exploits vulnerabilities in an application's software by inserting malicious SQL statements.

20
New cards

Ophcrack

A tool used to recover passwords from Windows systems using rainbow tables.

21
New cards

Industrial Espionage

The theft of trade secrets or confidential information from a business for commercial advantage.

22
New cards

Exit interviews

Meetings conducted with departing employees to gather insights about their experiences and reasons for leaving.

23
New cards

Formula for the value of information

VI = Cost to produce + Value Gained

24
New cards

Asset Identification

The process of recognizing and classifying assets within an organization to manage risk and security.

25
New cards

Company accused of stealing trade secrets

Apple

26
New cards

Company that paid 7 million to keep corporate espionage secrets

Uber

27
New cards

Company who defends dumpster diving

Refers to organizations that argue for the legality or ethicality of retrieving discarded information from trash.

28
New cards

Cookies

Small pieces of data stored on a user's computer by a web browser while browsing a website.

29
New cards

Biggest risk to organizations

Common risks include cyber attacks, data breaches, and DISGRUNTLED EMPLOYEES

30
New cards

Least Privileges

A security principle that states users should have the minimum level of access necessary to perform their job functions.

31
New cards

Encryption

The process of converting information into a code to prevent unauthorized access.

32
New cards

Asymmetric Cryptography

A type of encryption that uses a pair of keys (public and private) for secure communication.

33
New cards

Symmetric Cryptography

An encryption method where the same key is used for both encryption and decryption of data.

34
New cards

Caesar Cipher

A simple encryption technique that shifts letters in the alphabet by a fixed number of places.

35
New cards

Multi-alphabet substitution

A cryptographic technique that uses multiple alphabets to substitute letters in a message.

36
New cards

Plain Text

Unencrypted data that is readable without any special decoding.

37
New cards

Cipher Text

Data that has been encrypted and is not readable without decryption.

38
New cards

Hashing

The process of converting data into a fixed-size string of characters, which is typically a hash value.

39
New cards

Public Key Encryption

A cryptographic system that uses pairs of keys: a public key for encryption and a private key for decryption.

Explore top notes

note
Rhetorical Devices
Updated 898d ago
0.0(0)
note
Cancer Biology & Epidemiology
Updated 575d ago
0.0(0)
note
en el restaurante vocabulario
Updated 1070d ago
0.0(0)
note
Chapter 13 - Investment
Updated 1136d ago
0.0(0)
note
Mental Health Test Revision
Updated 291d ago
0.0(0)
note
Rhetorical Devices
Updated 898d ago
0.0(0)
note
Cancer Biology & Epidemiology
Updated 575d ago
0.0(0)
note
en el restaurante vocabulario
Updated 1070d ago
0.0(0)
note
Chapter 13 - Investment
Updated 1136d ago
0.0(0)
note
Mental Health Test Revision
Updated 291d ago
0.0(0)

Explore top flashcards

flashcards
ACA 101 Final
78
Updated 1201d ago
0.0(0)
flashcards
Sadlier Vocab Level G Unit 1-3
41
Updated 120d ago
0.0(0)
flashcards
ASD4 Cap 3
35
Updated 1150d ago
0.0(0)
flashcards
Listening and speaking 4
26
Updated 278d ago
0.0(0)
flashcards
Spanish 2 3.2 Vocabulary
27
Updated 1162d ago
0.0(0)
flashcards
dossier 3 en route 2 (examen)
28
Updated 1022d ago
0.0(0)
flashcards
Biology Exam 8-12
141
Updated 1078d ago
0.0(0)
flashcards
ACA 101 Final
78
Updated 1201d ago
0.0(0)
flashcards
Sadlier Vocab Level G Unit 1-3
41
Updated 120d ago
0.0(0)
flashcards
ASD4 Cap 3
35
Updated 1150d ago
0.0(0)
flashcards
Listening and speaking 4
26
Updated 278d ago
0.0(0)
flashcards
Spanish 2 3.2 Vocabulary
27
Updated 1162d ago
0.0(0)
flashcards
dossier 3 en route 2 (examen)
28
Updated 1022d ago
0.0(0)
flashcards
Biology Exam 8-12
141
Updated 1078d ago
0.0(0)