longquiz

Cards (69)

  • What does malicious code include?
    Viruses, worms, Trojan horses, and bots
  • What is drive-by downloads malware?

    Malware that comes with a downloaded file
  • How do viruses spread?

    By replicating and copying themselves
  • What is the primary function of worms malware?

    To spread from computer to computer
  • What does ransomware do?

    Prevents access to files and demands payment
  • What are Trojan horses?

    Benign programs that act unexpectedly
  • What is a backdoor in malware?

    Access point for attackers in compromised systems
  • What is a bot in terms of malicious code?

    A type of code covertly installed online
  • What is a botnet?

    A collection of captured bot computers
  • At what levels is malicious code a threat?
    Both client and server levels
  • What are potentially unwanted programs (PUPs)?
    Programs that install themselves on computers
  • What does adware do?
    Serves pop-up ads to users
  • What are browser parasites?
    Programs that monitor and change browser settings
  • What is spyware used for?
    To obtain user information like keystrokes
  • What is phishing?
    Deceptive attempts to obtain confidential information
  • What is social engineering?
    Exploitation of human gullibility to distribute malware
  • Who are hackers?
    Individuals seeking unauthorized access to systems
  • What do crackers denote?
    Hackers with criminal intent
  • What is hacktivism?
    Cybervandalism for political purposes
  • What are white hats?
    Good hackers who fix security flaws
  • What are black hats?
    Hackers who intend to cause harm
  • What are grey hats?
    Hackers pursuing a greater good by revealing flaws
  • What is cybervandalism?
    Intentionally disrupting or destroying a site
  • What is a data breach?
    Loss of control over information to outsiders
  • What is credit card fraud?
    Theft of credit card data online
  • What is identity fraud?
    Unauthorized use of another person's data
  • What is spoofing?
    Hiding true identity using someone else's information
  • What is pharming?
    Automatically redirecting a web link to a different address
  • What is spam?
    Advertisements disguised as offers
  • What is a Denial of Service (DOS) attack?
    Flooding a website with useless traffic
  • What is a Distributed Denial of Service (DDOS) attack?
    Using multiple computers to attack a network
  • What is a sniffer?
    An eavesdropping program monitoring network information
  • What are email wiretaps?
    Methods for recording email traffic
  • What is security?
    Quality of being free from danger
  • What are the multiple layers of security an organization should have?
    • Physical security
    • Personnel security
    • Operations security
    • Communications security
    • Network security
    • Information security
  • What is encryption?
    Transforming plain text into cipher text
  • What is a key (cipher)?
    Method for transforming plain text to cipher text
  • What is a substitution cipher?
    Replacing letters systematically with others
  • What is a transposition cipher?
    Changing the order of letters systematically
  • What is symmetric key encryption?
    Same key used for encryption and decryption