Ch.14 Network threats and Mitigation Flashcards
____Prevents users from access to the network
DoS
___ is very large ICMP packets sent to the remote host victim flooding the victims buffer causing a reboot or a hang.
Ping of death
An unreachable gateway is an attempt to make a hosts ____ unreachable so the attacker can preform a ____ attack
Default gateway, Man in the middle
An amplified DoS attack is a ___ attack
Distributed denial of service (DDoS).
A traffic spike is a ___ flood
SYN
___ is the process of changing a source IP address so that one computer appears to be a different computer
Spoofing
ARP cache poising is___
ARP spoofing
Changing the http packet is known as ___ spoofing
Referrer spoofing
Zero day attacks refer to what?
new bugs and viruses that have not yet been known and corrected.
___addresses methods of spying used on information systems and how to protect against them
TEMPEST
When somebody intercepts packets intended for one computer and reads the data is known as ____
Man in the middle
Constantly scanning the network for break-ins is known as ____
Active detection
The logging of network events to a file is known as ___
Passive detection
___involves using tools to shore up network walls against attacks
Proactive defense.