Adware: adds advertisements to a browser, it can re-redirect search and web activity to alternate sites. When designed to be aggressive it can cause ads to pop up involuntarily on your device.
Spyware: pulls details off of your devices. It can pull your browser history, credit card info, or login information to the sites that you log into like banking or social media.
Key Loggers log your keystrokes providing an attacker the information they need to access your accounts or gain other information through analyzing the input received.
Virus malware that can copy itself and spread. It attaches itself to other files. They require user interaction to work.
Worm Do not require user interaction. It spreads on its own utilizing the resources of the system it is on.
Trojan Horse a program that is legitimate or gives the appearance of legitimacy but ultimately performs the malicious tasks it was designed to do.
Bot computer that has been taken over and its used as a proxy to execute Denial of Service or other types of exploitation. These are sometimes a collection that are command and controlled by an attacker. These collections of computers can be sold by their creator
adds advertisements to a browser, it can re-redirect search and web activity to alternate sites. When designed to be aggressive it can cause ads to pop up involuntarily on your device.
pulls details off of your devices. It can pull your browser history, credit card info, or login information to the sites that you log into like banking or social media.
log your keystrokes providing an attacker the information they need to access your accounts or gain other information through analyzing the input received.
malware that can copy itself and spread. It attaches itself to other files. They require user interaction to work.
Do not require user interaction. It spreads on its own utilizing the resources of the system it is on.
a program that is legitimate or gives the appearance of legitimacy but ultimately performs the malicious tasks it was designed to do.
computer that has been taken over and its used as a proxy to execute Denial of Service or other types of exploitation. These are sometimes a collection that are command and controlled by an attacker. These collections of computers can be sold by their creator.
Spyware: pulls details off of your devices. It can pull your browser history, credit card info, or login information to the sites that you log into like banking or social media.
Key Loggers log your keystrokes providing an attacker the information they need to access your accounts or gain other information through analyzing the input received.
Virus malware that can copy itself and spread. It attaches itself to other files. They require user interaction to work.
Worm Do not require user interaction. It spreads on its own utilizing the resources of the system it is on.
Trojan Horse a program that is legitimate or gives the appearance of legitimacy but ultimately performs the malicious tasks it was designed to do.
Bot computer that has been taken over and its used as a proxy to execute Denial of Service or other types of exploitation. These are sometimes a collection that are command and controlled by an attacker. These collections of computers can be sold by their creator
Drag the words into the correct boxes
4
Accesses the internet on behalf of internal network clients(5,6)
A) PROXY SERVER
7
Monitors network activity for suspicious traffic and potentially performs mitigation tasks(9,10,6)
A) INTRUSION PROTECTION SYSTEM
9
Validation of who is logging on(14)
A) AUTHENTICATION
10
Mitigation of vulnerabilities(8)
A) PATCHING
12
Monitors network activity for suspicious traffic(9,9,6)
A) INTRUSION DETECTION SYSTEM
13
Detects bad software on End points(12)
A) ANTI MALWARE
Down
1
Connects external clients like they are an internal client(7,7,7)
A) VIRTUAL PRIVATE NETWORK
2
Validation of access to restricted network locations(13)
A) AUTHORIZATION
3
FWs check packets with this(8,10)
A) STATEFUL INSPECTION
5
Non-technical controls are called(8,3,14)
A) PHYSICAL AND ADMINISTRATIVE
6
Layered Defense(7,2,5)
A) DEFENSE IN DEPTH
8
Checks email threats(5,7)
A) EMAIL SCANNER
11
Blocks Ports and Protocols(9)
A) FIREWALLS
Comments
Post a Comment