This malware is hidden inside other software that appears to be harmless.
What is a Trojan Horse?
A flaw or potential for harm in a system.
What is a Vulnerability?
Small text files saved on the computer for web browsers and websites.
What is a Cookie?
Technology that tracks a user's keystrokes on the keyboard.
What is a Keylogger?
Computing embedded into everyday objects and environments; also called "pervasive computing."
What is Ubiquitous Computing (Ubicomp)?
This form of malware allows the hacker to use an embedded backdoor to gain administrative control of the victim's computer.
What is a Remote Access Trojan (RAT)?
Something that takes a vulnerability to a level where it can be exploited.
What is a Threat?
A cookie that exists only as long as the web browser is open.
What is a Session Cookie?
Software installed on a computer that collects data on the user and redirects advertising sites to the web browser.
What is Adware?
Revolves around incorporating computing technology into atypical devices to allow communication with other devices and the Internet.
What is the Internet of Things (IoT)?
This malware encrypts data so the user cannot access it until a fee is paid to the hacker.
What is Ransomware?
A vulnerability that exists in software when it was released and remains unknown until it is exploited by hackers.
What is a Zero-Day Vulnerability?
A cookie that stays on your computer until an expiration date is met.
What is a Persistent Cookie?
Using a lie or scam to obtain private information.
What is Pretexting?
Policies that allow employees and students to use personal devices on organizational networks.
What is BYOD (Bring Your Own Device)?
This malware changes its characteristics in attempts to avoid detection from antivirus programs.
What is a Polymorphic virus?
Secret or unknown access point into a system.
What is a Backdoor?
Unique code assigned to the user's connection for a period of time to keep track of the website state.
What is a Session ID?
Digging through the trash for useful information.
What is Dumpster Diving?
Organization approves a set of user-owned devices.
What is CYOD (Choose Your Own Device)?
This virus infects a computer before the operating system loads.
What is a Rootkit?
Software that is embedded in hardware.
What is Firmware?
When a malicious actor gets possession of a user's active Session ID and impersonates the user in a connection to the website.
What is Session Hijacking?
Information about a person left behind by his or her actions on the Internet.
What is a Digital Footprint?
Company provides device for both work and personal use.
What is COPE (Company-Owned, Personally-Enabled)?