Term
|
Definition
| Attaches itself to legitimate programs and then creates programs with a different file extension. |
|
|
Term
|
Definition
| A virus that attaches itself to a macro and can infect documents and spead through email. |
|
|
Term
|
Definition
| The fastest growing exploitation today. |
|
|
Term
|
Definition
| Attacks your system in many differnt ways. |
|
|
Term
|
Definition
| Modifies other programs and databases. All infected applications must be reinstalled to fix it. |
|
|
Term
|
Definition
| Changes form, even encrypting parts of itself to avoid detection. |
|
|
Term
|
Definition
| Covers itself with code that makes the important parts hard to detect. |
|
|
Term
|
Definition
| Attacks or bypasses antivirus software. An anti-antivirus. |
|
|
Term
|
Definition
| Hides from applications. May attach itself to the boot sector of the hard drive. |
|
|
Term
| Update software, use Antivirus software and educate users. |
|
Definition
| Name the three most important methods to avoid getting malware. |
|
|
Term
|
Definition
| An application is used to create an entrance for the attacker. For instance, it might allow a certain username to have administrative privileges |
|
|
Term
|
Definition
| An attack that exploits maintenance hooks. |
|
|
Term
|
Definition
| An attack where something or someone masquerades as something else. |
|
|
Term
|
Definition
| An attack where data is made to look like it came from a trusted host. |
|
|
Term
|
Definition
| Software is put between the server and user to intercept data. |
|
|
Term
|
Definition
| An attack where information, such as user name, password, or certificate, is captured and resubmitted. |
|
|
Term
|
Definition
| Account attacked repeatedly to try to guess the password. |
|
|
Term
|
Definition
| A password guessing attack without a dictionary. |
|
|
Term
|
Definition
| A password guessing attack, which can be automated, that uses a dictionary of commonly used passwords |
|
|
Term
|
Definition
| An attack that uses a ping of death or a buffer overflow. |
|
|
Term
| Distributed Denial of Service Attack |
|
Definition
|
|
Term
|
Definition
| Allows process to be run that are hidden from the task manager |
|
|
Term
|
Definition
| Uses a Key Distribution Center |
|
|
Term
| WiFi Protected Access (WPA2 is better) |
|
Definition
|
|
Term
| Wireless Transport Layer Security |
|
Definition
|
|
Term
| Vista Enterprise and Ultimate |
|
Definition
| What versions of windows does Bitlocker work with |
|
|
Term
|
Definition
| What is HTML for wireless |
|
|
Term
| Encryption, Secure Hash Algorithm |
|
Definition
|
|
Term
Encryption Message Digest Algorithm MD5, MD4, MD2 |
|
Definition
|
|
Term
| Trusted Platform Module A chip to help create hash keys |
|
Definition
|
|
Term
| No write up or read down so data can't mix |
|
Definition
|
|
Term
| Can't read up or write down, not concerned with data integrity |
|
Definition
| Define the Bell-LA Module |
|
|
Term
| Uses different applications to read, and write |
|
Definition
| Define Clark-Wilson Model |
|
|
Term
|
Definition
| Occurs when an attacker takes control of a network session |
|
|
Term
|
Definition
| Sends a ping to a group of hosts in a network, that ping is echoed back from the hosts and overwhelmes the network. |
|
|
Term
|
Definition
| Two extentions to disallow in attachments |
|
|
Term
| Windows 2000 = ERD, Windows XP and Vista used ARD |
|
Definition
| Which versions of windows uses ERD and ARD |
|
|
Term
|
Definition
| Uses an ICMP packet to carry malicious code. |
|
|
Term
|
Definition
| Sends packets to a server without an end packet thus filling up the server buffer and denying service to the server |
|
|
Term
|
Definition
| Uses maintenance protocol to overload a server |
|
|