dware: adds advertisements to a browser, it can re-redirect search and web activity to alternate sites. When designed to be aggressive it can cause ads to pop up involuntarily on your device.
Spyware: pulls details off of your devices. It can pull your browser history, credit card info, or login information to the sites that you log into like banking or social media.
Key Loggers log your keystrokes providing an attacker the information they need to access your accounts or gain other information through analyzing the input received.
Virus malware that can copy itself and spread. It attaches itself to other files. They require user interaction to work.
Worm Do not require user interaction. It spreads on its own utilizing the resources of the system it is on.
Trojan Horse a program that is legitimate or gives the appearance of legitimacy but ultimately performs the malicious tasks it was designed to do.
Bot computer that has been taken over and its used as a proxy to execute Denial of Service or other types of exploitation. These are sometimes a collection that are command and controlled by an attacker. These collections of computers can be sold by their creator
Drag the words into the correct boxes
Adware: adds advertisements to a browser, it can re-redirect search and web activity to alternate sites. When designed to be aggressive it can cause ads to pop up involuntarily on your device.
Spyware :pulls details off of your devices. It can pull your browser history, credit card info, or login information to the sites that you log into like banking or social media.
Keyloggers: log your keystrokes providing an attacker the information they need to access your accounts or gain other information through analyzing the input received.
Virus : malware that can copy itself and spread. It attaches itself to other files. They require user interaction to work.
Worm: Do not require user interaction. It spreads on its own utilizing the resources of the system it is on.
Trojan Horse: a program that is legitimate or gives the appearance of legitimacy but ultimately performs the malicious tasks it was designed to do.
Bot: computer that has been taken over and its used as a proxy to execute Denial of Service or other types of exploitation. These are sometimes a collection that are command and controlled by an attacker. These collections of computers can be sold by their creator.
Accesses the internet on behalf of internal network clients
PROXY SERVER
Monitors network activity for suspicious traffic and potentially performs mitigation tasks
INTRUSION PROTECTION SYSTEM
Validation of who is logging on
AUTHENTICATION
Mitigation of vulnerabilities
PATCHING
Monitors network activity for suspicious traffic
INTRUSION DETECTION SYSTEM
Detects bad software on End points
ANTI MALWARE
Connects external clients like they are an internal client
VIRTUAL PRIVATE NETWORK
Validation of access to restricted network locations
AUTHORIZATION
FWs check packets with this
STATEFUL INSPECTION
Non-technical controls are called
PHYSICAL AND ADMINISTRATIVE
Layered Defense
DEFENSE IN DEPTH
Checks email threats
EMAIL SCANNER
Blocks Ports and Protocols
FIREWALLS
Other Links:
See other websites for quiz:
Check on QUIZLET
