10.1 Flashcards
This is the person in the original sense of the word is someone who Masters the inner workings of computer hardware and software to better understand them today this person is used to be a complement reflecting extraordinary computer skills and the word is used more generally describe individuals again on authorize access the system or networks with or without malicious intent
Hacker or hackers
A weakness of a system process architecture that could lead to compromise information or on authorize access is known as a
Vulnerability
The act of taking advantage of a phone or abilities called
Exploit
——- project is funded by the US Department of homeland security and list free to access use analyze vulnerabilities and exposures that only MITRE corporation can make changes to
Cve
It’s like like like like like vulnerability receives a standardized identification number which makes it easier to track vulnerabilities cross systems
CVE
 Which could be a Miller and check the file such a free music download or malware infected device such as a USB drive wine around simile left and garden for someone to take an attempt to use on their own computer not realizing what is on the download or what is on the USB drive that could possibly Turn you into a victim compromise your data or online accounts
Baiting
This is where something such as a free gift or services offered exchange for private information or temporary access to the users computer system
Quid pro quo
Playing a blank solution that identifies sense of data on the network to prevent it from being coffee or transmit it often at work
Data loss prevention
This is the type of deal with the tech that is bounced off on infected computers called reflectors before Being directed at the target
DRDOS
I’m here just kind of attack is a DRDOS attack take me amplified when conducted using small simple request the trigger very large responses from the target
Amplifying DRDOS
Which type of TOS attack damage is the devices firmware beyond repair this is called breaking advice because infection effectively turns the device into a brick
PDOs or permanent DOS
An unintentional DOs Attack is not done with malicious intent
Friendly DOS attack
Previously called and man in the middle attack relies on intercepted transmission can take several forms in all forms of attack redirection captures secure transmissions as they occur
On path attack
 when a Wi-Fi client is legitimately connected to a wireless access point the a P or the client can send it to the office indication frame to tell other devices that you authentication session is being terminated. These frames are unencrypted and are easily spoofed the attacker send fake tortilla sanitation frames to the AP client or both To trigger a D authentication process
Deauthentication attack
TCP/IP particles are inherently ——
Insecure