Security

¡Supera tus tareas y exámenes ahora con Quizwiz!

Worm

a standalone malware computer program that replicates itself in order to spread to other computers

Rootkits

a stealthy type of software, typically malicious, designed to hide the existence of certain processes or programs from normal methods of detection and enable continued privileged access to a computer

Social engineering

psychological manipulation of people into performing actions or divulging confidential information.

Malware

short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems.

Spyware

software that aids in gathering information about a person or organization without their knowledge and that may send such information to another entity without the consumer's consent, or that asserts control over a computer without the consumer's knowledge

Phishing

the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication

Shoulder surfing

using direct observation techniques, such as looking over someone's shoulder, to get information

Trojan

a generally non-self-replicating type of malware program containing malicious code that, when executed, carries out actions determined by the nature of the Trojan, typically causing loss or theft of data, and possible system harm.

Virus

a malware program that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected"


Conjuntos de estudio relacionados

Radiation Protection (Biological aspects of radiation) ARRT

View Set

Chapter 19: Postoperative Nursing Management

View Set

Marketing 11, 12, 15, 19 (final p1)

View Set

Section 13, Unit 1: Arizona Real Estate Contracts

View Set

Business Intro Chapter 5 How to form a business

View Set

Collaborative-Management of Care

View Set