Midterm Reviewer Part 6

Automatic propagation without human assistance Concealment/disguise/camouflage
Trojan
Worm
Virus
Modifies operating system to hide its existence
Worm
Root
Rootkit
Provides desirable functionality but hides malicious operation
Worm
Rootkit
Trojan
Security hole that is created in a software system by one of its programmers
Outsiders Attack
Insiders Attack
External Attack
Hidden feature or command in a program that allows a user to perform actions he or she would not normally be allowed to do
Backdoors or Trapdoors
Hackers
Cracker
Program that performs a malicious action as a result of a certain logic condition
Backdoors or Trapdoors
Hackers
Logic Bombs
Computer code that can replicate itself by modifying other files or programs to insert code that is capable of further replication
Computer Virus
Malwares
Worms
Virus just exists the virus is laying low and avoiding detection
Propagation Phase
Dormant Phase
Trigerring Phase
Action Phase
Virus is replicating itself, infecting new files on new systems
Propagation Phase
Dormant Phase
Trigerring Phase
Action Phase
Some logical condition causes the virus to move from a dormant or propagation phase to perform its intended action
Propagation Phase
Dormant Phase
Trigerring Phase
Action Phase
0
{"name":"Midterm Reviewer Part 6", "url":"https://www.quiz-maker.com/QG2Q2FTXL","txt":"Automatic propagation without human assistance Concealment\/disguise\/camouflage, Modifies operating system to hide its existence, Provides desirable functionality but hides malicious operation","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}
Powered by: Quiz Maker