Attacks Flashcards
Sniffing
hjk
Man in the Middle
hjk
DoS
hjk
Smurf
hjk
Fraggle
hjk
SYN Flood
hjk
Broadcast Storms
hjk
Ping of Death
hjk
Dial Tone
hjk
War Driving
hjk
Evil Twin
hjk
Bluesnarfing
hjk
Bluejacking
hjk
DDoS
hjk
Replay/Playback
hjk
Brute Force
hjk
Malicious Port Scanning
hjk
Backdoor 1
provides another way of accessing a system
Backdoor 2
hjk
Virus
A set of malicious code that attaches itself to a host application. Once the host application is executed, the malicious code executes as well. (Chapter 6)
Worm
a self-replicating malware that resides in memory. It uses different transport protocols to travel over the network and consumes network bandwidth.
Trojan Horse
appears to be something useful but includes a malicious component, such as installing a backdoor on a system. Many Trojans are delivered via drive-by downloads.
Ransomeware
A type of Trojan. Attackers take control of a user’s computer and then demands a ransome
Logic Bomb
a string of code embedded into an application/script that executes in response to an event.
Rootkit
A group of programs that hides the fact that the system has been infected or compromised by malicious code.
Malformed MIME
hjk
Pharming
hjk
Transitive Attack
hjk
Social Engineering
social tactics to trick users into giving up info or performing actions they wouldn’t normally take.
Typosquatting
hjk
Watering Hole Attack
hjk
Piggybacking/Tailgating
the practice of one person following closely behind another without showing credentials
Tracking Cookie
hjk
Phishing
the practice of sending email to users with the purpose of tricking them into revealing personal info or clicking on a link. (Malicious Spam)
Whaling
form of spear phishing that attempts to target high-level executives (C Level).
Vishing
an attack using the phone system to trick users into giving up personal and financial information
Botnet
Robot Network: includes multiple computers that act as robots and function together in a network for malicious purposes.
Spam
unwanted or unsolicited email
Spear Phishing
a targeted form of phishing.
Spim
a form of spam using instant messaging