A Flashcards
Availability
Assurance that the systems responsible for delivering, storing, and processing information are accessible when required by the authorized users.
Authenticity
Refers to the characteristic of a communication, document, or any data that ensures the quality of being genuine.
Active Attacks
Active attacks tamper with the data in transit or disturb communication or services between the systems to bypass or break into secured systems.
Adversary Behavioral Identification
Adversary behavioral identification involves the identification of the common methods or techniques followed by an adversary to launch attacks on or to penetrate an organization’s network.
Active Footprinting
Active footprinting involves gathering information about the target with direct interaction.
ARP Ping Scan
Attackers send ARP request probes to target hosts, and an ARP response indicates that the host is active.
ACK Flag Probe Scan
Attackers send TCP probe packets set with an ACK flag to a remote device, and then analyze the header information (TTL and WINDOW field) of received RST packets to determine if the port is open or closed.
Anonymizer
An anonymizer is an intermediate server placed between you as the end user and the website to access the website on your behalf and make your web surfing activities untraceable.
Audio Steganography
Audio steganography refers to hiding secret information in audio files such as .MP3, .RM, and .WAV.
Advanced Persistent Threats
Advanced persistent threats (APTs) are defined as a type of network attack, where an attacker gains unauthorized access to a target network and remains undetected for a long period of time.
Antivirus Sensor System
An antivirus sensor system is a collection of computer software that detects and analyzes malicious code threats such as viruses, worms, and Trojans.
Active Sniffing
Active sniffing involves injecting Address Resolution Packets (ARP) into the network to flood the switch’s Content Addressable Memory (CAM) table, which keeps track of host-port connections.
Address Resolution Protocol (ARP)
Address Resolution Protocol (ARP) is a stateless protocol used for resolving IP addresses to machine (MAC) addresses.
ARP Spoofing Attack
ARP spoofing involves constructing many forged ARP request and reply packets to overload the switch.
Application Level Hijacking
Application level hijacking refers to gaining control over the HTTP’s user session by obtaining the session IDs.