Terminology
More Terminology
Acronyms
Misc
Malware and Crypto-Malware
100

A virus that is protected in a way that makes disassembling it difficult. The difficulty makes it “__________” against antivirus programs that have
trouble getting to, and understanding, its code.

Armored virus

100

Protocol used to map known IP addresses
to unknown physical addresses.

Address Resolution Protocol

100

ARP

Address Resolution Protocol

100

Any application that masquerades as one thing in order to get past scrutiny and then does something malicious

Trojan horse

100

Software that does harm—intentionally

Malware

200

Software that gathers information to pass on to marketers or that intercepts personal data such as credit card numbers and makes it available to third
parties

Adware

200

Minimizing the possibility of exploitation by
reducing the amount of code and limiting potential damage

Attack surface reduction

200

ASR

Attack surface reduction

200

Software programs that work—often actively—on behalf of a third party.

Spyware

200

Takes control of a system and demands that a third party be paid.

Ransomware

300

Any unauthorized intrusion into the normal operations of a computer or computer network. 

Attack

300

A form of web-based attack in which unauthorized commands are sent from a user that a website trusts

Cross-site request forgery

300

XSRF

Cross-site request forgery

300

Software that demands payment before restoring the data or system infected.

Ransomware

300

Can do various roguish things once it is on a system, but its primary purpose is to replicate.

Worm

400

An opening left in a program application (usually by the developer) that allows additional access to data. Typically, a ___________ is created for debugging
purposes and is not documented

Backdoor

400

A type of attack that prevents any users—even legitimate ones—from using a system.

Denial-of-service

400

XSS

Cross-site scripting

400

An attribute of some viruses that allows them to mutate and appear differently each time they crop up

Polymorphic

400

Software programs that have the ability to hide certain things from the operating system.

Rootkits

500

Running a script routine on a user’s machine from a
website without their permission.

Cross-site scripting (XSS)

500

A derivative of a DoS attack in which
multiple hosts in multiple locations all focus on one target to reduce its availability to the public

Distributed denial-of-service

500

DDoS

Distributed denial-of-service

500

Any code that is hidden within an application and causes something unexpected to happen based on some criteria being met

Logic bomb

500

Software running on infected computers called zombies is often known as a _______

Bots

600

A permission method in which users are granted only the privileges necessary to perform their job function.

Least privilege

600

Any code that is meant to do harm.

Malicious code

600

DNS

Domain Name System

600

An attack that begins the very day an exploit is discovered

Zero-day exploit

600

One that, as the name implies, allows a
remote user to access the system for the purpose of administering it.

RAT A remote administration tool (RAT)

700

Any code that is hidden within an application and causes something unexpected to happen based on some criteria being met

Logic bomb

700

A program intended to damage a computer system.

Virus

700

MITM

Man-in-the-middle

700

Attaches itself to legitimate programs and then
creates a program with a different filename extension

Companion Virus

700

Name a reason attackers initiate an attack

They might be doing it for the sheer fun of it.
They might be criminals attempting to steal from you.
They might be individuals or groups who are using the attack to make a political statement or commit an act of terrorism.

M
e
n
u