CompTIA Security + Chapter 2

CompTIA Security +

10 cards   |   Total Attempts: 192
  

Cards In This Set

Front Back
Privilege Escalation
The act of exploiting a vulnerability in the software to gain access to resources that the user would normally be restricted obtaining.
Virus
A program that secretly attatches itself to a legitimate "carrier," such as a document or program, and then executes when that document is open or the program is launched.
Worm
A program that secretly attatches itself to legitimate "carrier," such as a document or program
Trojan horse (Trojan)
A program advertised as performing one activity but actually doing something else, or performing both the advertised and the malicious activities.
Spyware
A general term used to descibe software that violates a user's personal security.
Spam
Unsolicited email
Adware
A software program that delivers advertising content in a manner that is unexpectd and unwanted by the user.
Rootkits
A set of software tools used by an intruder to break into a computer, obtain special privileges to perform unauthorized functions, and then hide all traces of its existence.
Botnets
A group of zombie computers that are under the control of an attacker.
Logic Bomb
A computer program or a part of a program that lies dormant until it is triggered by a specific logical event.