1 / 23
DMZ (Network Security Zone)
Click the card to flip 👆
Terms in this set (23)
Trojan horsessoftware program that appears to be benign but then does something other than expected. ducting into system like game, wallpaper downloadHow would you classify a piece of malicious code designed collect data about a computer and its users and then report that back to a malicious actor?SpywareAdwarecode that display unsolicited advertisementRATS(Remote Access Trojan) - malware that arrives in a trojan disguised as a legitimate software; sets up a secret communication link with the hacker.Root kitprogram that hides in a computer and allows someone from a remote location to take full control of the computer at the lowest levelRansomeware (cryptoviral extortion)A form of malware that encrypts the victim's files, making them inaccessible, until a ransom is paid to decrypt them.APTs (Advanced Persistent Threats)main goal, is to get access and monitor the network to steal Information while it's staying undetected for a long period of time.BotnetA logical computer network of zombies under the control of an attacker. That call home when commandedKeyloggerA small hardware device or a program that monitors seach keystroke a user types on the computer's keyboard.logic bombComputer code that lies dormant until it is triggered by a specific logical event.Antivirus software can be classified as which form of threat controlTechnical ControlPacket Sniffinginspecting information packets as they travel the Internet and other networksUse of humans for cyber purposesSocial Engineering