Save
longquiz
Save
Share
Learn
Content
Leaderboard
Share
Learn
Created by
Lee chan
Visit profile
Cards (69)
What does malicious code include?
Viruses
,
worms
,
Trojan horses
, and
bots
View source
What is
drive-by
downloads malware?
Malware that comes with a downloaded file
View source
How do
viruses
spread?
By replicating and copying themselves
View source
What is the primary function of
worms
malware
?
To spread from computer to computer
View source
What does
ransomware
do?
Prevents access to files and demands payment
View source
What are
Trojan
horses
?
Benign programs that act unexpectedly
View source
What is a
backdoor
in malware?
Access point for attackers in compromised systems
View source
What is a
bot
in terms of malicious code?
A type of code covertly installed online
View source
What is a
botnet
?
A collection of captured bot computers
View source
At what levels is malicious code a threat?
Both
client
and
server
levels
View source
What are potentially unwanted programs (PUPs)?
Programs that
install
themselves on computers
View source
What does adware do?
Serves
pop-up
ads to users
View source
What are browser parasites?
Programs that monitor and change browser settings
View source
What is spyware used for?
To obtain user information like
keystrokes
View source
What is phishing?
Deceptive attempts to obtain
confidential
information
View source
What is social engineering?
Exploitation of human gullibility to distribute
malware
View source
Who are hackers?
Individuals seeking
unauthorized
access
to systems
View source
What do crackers denote?
Hackers with criminal
intent
View source
What is hacktivism?
Cybervandalism
for political purposes
View source
What are white hats?
Good
hackers
who fix security flaws
View source
What are black hats?
Hackers
who intend to cause harm
View source
What are grey hats?
Hackers pursuing a greater good by revealing
flaws
View source
What is cybervandalism?
Intentionally
disrupting
or destroying a site
View source
What is a data breach?
Loss of control over information to
outsiders
View source
What is credit card fraud?
Theft
of credit card data
online
View source
What is identity fraud?
Unauthorized
use of
another
person's data
View source
What is spoofing?
Hiding
true
identity using
someone
else's information
View source
What is pharming?
Automatically redirecting a
web link
to a different address
View source
What is spam?
Advertisements
disguised as
offers
View source
What is a Denial of Service (DOS) attack?
Flooding a
website
with useless traffic
View source
What is a Distributed Denial of Service (DDOS) attack?
Using multiple
computers
to attack a network
View source
What is a sniffer?
An
eavesdropping
program monitoring
network
information
View source
What are email wiretaps?
Methods
for recording email traffic
View source
What is security?
Quality of being free from
danger
View source
What are the multiple layers of security an organization should have?
Physical security
Personnel security
Operations security
Communications security
Network security
Information security
View source
What is encryption?
Transforming
plain text
into
cipher text
View source
What is a key (cipher)?
Method for transforming
plain text
to
cipher text
View source
What is a substitution cipher?
Replacing letters
systematically
with others
View source
What is a transposition cipher?
Changing the order of letters
systematically
View source
What is symmetric key encryption?
Same key used for
encryption
and
decryption
View source
See all 69 cards
See similar decks
Longquizz
40 cards
UTS LONGQUIZ
120 cards
IM2 LONGQUIZ
127 cards
ENTREP LONGQUIZ PREFI
80 cards
Week7-10LONGQUIZ
WEB DEVELOPMENT
91 cards
LONGQUIZ
108 cards
BIOCHEM - LONGQUIZ
168 cards
Pathfit longquiz
86 cards
Philippine History
49 cards
longquiz2
59 cards
LONGQUIZ-MICROPARA
67 cards
Rt100 final (longquiz)
117 cards
IRT LONGQUZ
45 cards
Longqi
160 cards
longquiz enviscie midterms
43 cards
Art App longquiz
33 cards
longquiz
76 cards
longquiz
35 cards
LONGQUIZ
48 cards
LONGQUIZ
1 card
Longquiz
MLS 038
63 cards