MIS 170 Quiz 1
Malicious add-on
a browser-add on that contains some type of malware
Denial of service
a condition that prevents system from handling current and new requests
Backdoor
a hidden way to bypass access controls
Keystroke logger
a program that captures user entries and then forwards that information to an attacker
Botnet
a robotically controlled network used to launch attacks
Rootkit
a software program that conceals presence and disguises system compromise
Injection
an action in which malicious software provides deliberately invalid input to some other software to cause an error condition, allowing an attack to occur
Phishing
an attack that tricks users into revealing credentials or confidential information
Virus
an executable program that attaches to, or infects, other executable programs and then replicates to infect yet more programs
Trojan Horse
any program that masquerades as a useful program while hiding its malicious intent
Logic Bomb
code that executes a hidden payload when certain conditions or time constraints are met
Spam
undesirable and unsolicited email that often involves fraud or includes malware
Ransomware
malware that attempts to generate funds from a computer user
Worm
self-replicating software program that remotely infects computers across networks
Adware
software that displays unsolicited or unwanted advertisements
Spyware
software that invades computers or observes usage habits without permission