Question | Answer |
Malware | A malicious software designed to damage and destroy computers and computer systems |
Viruses | Malware that can reproduce itself. It needs an end user to start the replication process |
Worm | A malware that self-replicates and doesn't need human intervention to spread, unlike a virus. |
Ransomware | Locks an organization out of it's own data and computer, demanding payment in order to restore services. The goal is to prevent the victim from accessing systems or files in exchange for electronic payment |
Trojan | Malicious code or software that pretends to be something it's not, so it can infect your computer. They are design to damage, disrupt, steal, or inflict some other harmful action on your data or network |
Backdoor | An undocumented way of gaining access to a computer. A backdoor is a potential security risk |
Root-kit | A set of tools used by an attacker after gaining root-level access to a host to conceal the attackers' activities on the host and permit the attacker to maintain root-level access to the host through covert means |
Adware | A software that displays unwanted advertising on your computer device. Though they are not necessarily malicious, they can redirect you to malicious sites. |
Spyware | Malware that spies on you. They are covertly installed on a system or device and monitors the victims activities and gain personal information without their knowledge |
Bots | "Bot" is short for Robot. A bot is a single piece of automated software that performs predefined assignments on command, usually over the network |
Botnet | A collective of bots working together and controlled by a single operator |
Logic Bomb | A piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met |
Hashing the password | One-way transformation on a password, turning the password into another String, called the hash password. |
Password Spraying Attack | A type of brute force attack, where attackers will use one password against many different accounts. This prevents accounts from being locked out, instead of brute forcing a single account with many passwords |
Brute Force Attack | A hacking method that tries every possible password/passphrase combination with the hopes of getting a match. |
Dictionary Attack | Use common words taken from a dictionary in hopes they will be the passwords they are looking for |
Rainbow Tables | A database that’s an optimized, pre-built set of hashes that were created earlier |
Salt | A random string of data used to modify a password hash. |
Want to create your own Flashcards for free with GoConqr? Learn more.