Vector
Malware
Components
Muffins
Certs
Walls
100

Using secure protocols like these mitigates data interception when on Open Networks

SSL/TLS  p366

100

These Malware are principally designed to spread to other computers

Worms & Viruses  p366

100

This Browser Add-On will change the appearance using custom images and color schemes

Themes  p371

100

This is a plain text file created by a website when you visit

Cookie  p372

100

This Framework issues digital certificates to secure websites to encrypt the traffic

Public Key Encryption (PKI)  p377

100

Enterprise networks often deploy these to filter client access to the Internet

Proxy Server  p381

200

Perform these 2 actions when using a Public workstation

Clear Browser cache & Clear Browser History  p366

200

This appears to be legitimate software application, but contains malicious functions like spyware or bots

Trojan Horse  p367

200

This Browser Add-On is designed to play embedded content or multimedia object

Plug-In  p371

200

This describers cookies created by the Domain you visit

First Party Cookies  p373

200

Browsers are installed with a number of these  that are automatically trusted from PKI

Root Certificates  p377

200

This is the default Firewall installed with Microsoft Windows

Windows Defender  p379

300

Is it a crime to access your neighbors WiFi without permission (YES/NO)

YES  p 366

300

This malicious software installs with a product agreement that helps a company track pages you visit and display targeted ads

Adware  p367

300

This web protocol is limited in terms of serving content other that text and pictures

HyperText Transport Protocol (HTTP)  p369

300

This may be used to display targeted advertising or collect metadata about your browser and browsing habits

Cookie  p372

300

A website digital certificate includes this encryption item you need decrypt in your browser

Public Key   p377

300

This type Firewall may be installed on a client PC to protect it

Host or Personal Firewall  p379

400

This is most exploited vector for infecting a computer with Malware

Web Browser  p366

400

This malware tries to track everything you do on your computer and is typically installed covertly

Spyware  p367

400

These can run on the server or on client to perform sophisticated actions

Scripts  p369

400

This describes cookies created by a frame/ad/window on a website you visit for a different Domain

Third Party Cookies  p373

400

This is required to decrypt the data in your browser from a given website

Private Key  p377

400

This type Firewall is installed as an application on a workstation or server

Software Firewall  p379

500

This term applies to software threats and tools designed to vandalize or compromise computer systems

Malware p366

500

Pop-Ups, mystery toolbars, odd search results are obvious symptoms from these two virus infections

Spyware & Adware  p368

500

Animated or interactive content are often provided through these mini applications

Add-Ons  p369

500

Are Pop-Ups helpful (YES/NO/MOSTLY)

MOSTLY  p373

500

Your Browser will show this icon in the address bar if the PKI certificate is valid and trusted

Padlock icon  p377

500

This is When would you should disable Windows Defender Firewall

When you install 3rd Party Firewall software   p379

600

This Browser mode does NOT store cookies or your browsing history

Private or Incognito Mode  p376

600

These Banner Ads, even for anti-virus software, are often actually infected with malicious code.

Drive-By Download  p368

600

These rival development environments provided interactive web content

Flash & Silverlight  p369

600

This describes a "sub-window" that appears over the main window when browsing

Pop-Up  p373

600

Your Browser will do this if the PKI encryption certificate is HIGHLY TRUSTED

Green Address Bar  p377

600

This Filter can be applied on a Firewall to block IP Addresses or Port Numbers

Packet Filter  p378

700

For fully anonymous Browsing, you should use this

a Virtual Private Network (VPN)  p376

700

This term refers to how vulnerable software on your computer provides an opening for attack

Exploit  p368

700

this full featured programming language developed sophisticated web apps, but requires client-side plug-in

JAVA  p369

700

Aggressive Pop-Ups that spawn when you open Browser, and even when you try to close the Browser, indicate this

Spyware or Malware   p374

700

Your Browser will do this if the certificate is UNTRUSTED or INVALID

Maroon Address Bar, block the site, WARNING message  p377

700

These Advanced Firewalls can analyze the contents of network data packets for suspicious signatures

Stateful Inspection  p378