Approximately two out of three malicious Web attacks have been developed using one of four popular attack toolkits
Like a virus, a worm needs the user to perform an action such as starting a program or opening an e-mail attachment to start the infection.
Software keyloggers are programs that silently capture all keystrokes, including passwords and sensitive information.
The most popular attack toolkit, which has almost half of the attacker toolkit market is ____.
____ is when an attacker tricks users into giving out information or performing a compromising action.
In a(n) ____ infection, a virus injects itself into the program's executable code instead of at the end of the file.
A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.
A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.
A(n) ____ virus adds a program to the operating system that is a malicious copycat version to a legitimate program.
A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as Trojans, viruses, or worms.
A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.
A(n) ____ refers to an undocumented, yet benign, hidden feature, that launches by entering a set of special commands, key combinations, or mouse clicks.
____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
____ involves horizontally separating words, although it is still readable by the human eye.