A | B |
malware | malicious software (worms, Trojan horses, spyware, and adware) Spans from mild to moderate intrusion and/or destruction. |
Virus | a piece of software designed to infect a computer system. May do nothing or may damage data on HDD, destroy the OS and possibly spread to other systems. |
Trojan horse | a program that enters a system or network under the guise of another program |
adware | unwanted pop-up advertisements |
worm | can reproduce by itself, it is self-contained, and doesn’t need a host application to be transported |
spyware | works on behalf of a 3rd party, not self-replicating but spread by users inadvertently asking for it. Users don’t know what it is they are installing/downloading |
phishing | a person or program attempting to gain information from a user/person for apparently legitimate use but is intended for improper use |
keystroke logger | records the keystrokes of a user |
spam | unwanted, unsolicited email |
DOS Attack | prevent access to resources by users authorized to use those resources. They are common on the internet |
hacker | a person attempting to gain access to data and/or resources they are not authorized to have |
spoofing attack | an attempt by someone or something to masquerade as someone else. IP and DNS Spoofing are most popular |
IP spoofing | an attack during which a hacker tries to gain access to a network by pretending their interface has the same network address as the internal network. It is where the data looks as if it came from a trusted host when it did not |
DNS spoofing | when the DNS server is given information about a name server that it thinks is legitimate when it is not. This can send users to a website other than the one they wanted to go to, reroute mail, or do any other type of redirection wherein data from a DNS server is used to determine a destination |
rootkits | have the ability to hide certain things from the operating system. A process may be running but not show up in the process list, or connections that do not show up in a Netstat display |
kerberos | an authentication scheme that uses tickets (unique keys) embedded within messages. Named after the three-headed guard dog that stood at the gates of Hades in Greek mythology |
CHAP | challenge handshake authentication protocol |
PAP | password authentication protocol |
Grayware | an application that is annoying or negatively affecting the performance of your computer |
Security | to protect physicall and electronically the systems and data from damage, deletion, theft, or corruption |