Terms
Malicious Software
100
This is a software, hardware, or procedural weakness that may provide an attacker the open door (s)he is looking for to enter a computer or network and have unauthorized access to resources within the environment.
What is a Vulnerability
100
a _______ is a small application, or string of code, that infects applications. The main function of this is to reproduce and it requires a host application to do this.
What is a Virus
200
A ____ is a potential danger to information or systems. This is something or someone who identifies a specific vulnerability and use it against the company or individual.
What is a threat
200
a ___ is short for _____ and is a piece of code that carries out functionality for it's master, who is the author of this code. Hint: Think "almost human"
What is a Bot or a Robot
300
An entity that takes advantage of a vulnerability is referred to as a ___________ ___________
What is threat agent
300
______ can reproduce without a host application and are self contained programs. This can propagate itself by using email, web-site downloads, and more.
What is a worm
400
An instance of being exposed to losses from a threat agent.
What is an exposure
400
a _______ ________ executes a program, or string of code, when a certain event happens or a data and time arrices.
What is a logic bomb
500
_______ is the likelihood of a threat agent taking advantage of a vulnerability and the corresponding business impact
What is a Risk
500
a _____ _________ is a program that is disguised as another program. Hint: Troy was invaded with this technique
What is a Trojan horse
M
e
n
u