SEARCH
You are in browse mode. You must login to use MEMORY

   Log in to start

ISDS 705 Chapter 13


🇬🇧
In English
Created:


Public
Created by:
CD Stucki


0 / 5  (0 ratings)



» To start learning, click login

1 / 22

[Front]


RAM scraping or storage scanning software:
[Back]


malicious code that scans for sensitive data

Practice Known Questions

Stay up to date with your due questions

Complete 5 questions to enable practice

Exams

Exam: Test your skills

Test your skills in exam mode

Learn New Questions

Dynamic Modes

SmartIntelligent mix of all modes
CustomUse settings to weight dynamic modes

Manual Mode [BETA]

The course owner has not enabled manual mode
Specific modes

Learn with flashcards
multiple choiceMultiple choice mode
SpeakingAnswer with voice
TypingTyping only mode

ISDS 705 Chapter 13 - Leaderboard

1 user has completed this course

No users have played this course yet, be the first


ISDS 705 Chapter 13 - Details

Levels:

Questions:

22 questions
🇬🇧🇬🇧
RAM scraping or storage scanning software:
Malicious code that scans for sensitive data
Data harvesters:
Cyber criminals who infiltrate systems and collect data for illegal resale
Cash-out fraudsters:
Criminals that purchase assets from data harvesters to be used for illegal financial gain. They might buy goods with stolen credit cards or create false accounts
Botnets:
Surreptitiously infiltrated computers
DDoS Distributed denial of security attacks:
Shutting down websites with a crushing load of seemingly legitimate requests
Hackers:
Someone who breaks into computer systems
White hat hackers:
Uncover computer weaknesses without exploiting them.
Black hat hackers:
Computer criminals who exploit a system's weakness for personal gain.
Hactivists:
Infiltrate a system and exposing information as a protest seeking to make a political point
Griefers or Trolls:
Malicious pranksters
Bad Apples:
Rogue employees who steal secrets, install malware, or hold a firm hostage
Social engineering:
Con games that trick employees into revealing information or performing other tasks that comprise a firm
Phishing:
Cons executed technology in order to: acquire sensitive information, trick someone into installing malicious software
Spoofed:
Emails transmissions
Zero-Day Exploits:
New attacks that haven't been clearly identified and haven't' been incorporated into security screening systems
Malware:
Seeks to comprise a computing systems without permission
Viruses:
Infect other software or files
Worms:
Take advantages of security vulnerability to automatically spread
Trojans:
Attempt to sneak in by masquerading as something they're not.
Botnets or Zombie networks:
Used in click fraud in sending spam to decipher accounts that use CAPTHAS
CAPTHAS:
Scrambled character images to thwart automated account setup or ticket buying attempts
Screen capture:
Records pixels that appear on a users screen to identify proprietary information