Chap_1-vocab. Flashcards
attackers exploit?
type of attack used by the attacker
traditional attackers motive?
for a sense of power, show off skills and petty crime
what is ip address spoofing?
used to hide the ip address of the attacker. false source ip in exploit packets - the attacker can’t receive replies.
chain of attack computer?
exploit packets contain the ip address of the last pc that the attack came from. a chain of computers helps hide the original attack computers source ip address by masking it with each computer the signal travels through (like several proxies).
what is ip address scanning?
an attacker scans the ip address block that the company/ victim owns. then the victim devices responds to ICMP requests (echo and reply msgs) telling the Attacker which ip addresses are active. then the next step tkes place.
piggybacking is what?
following someone through a secure door
shoulder surfing?
reading pin code over someones shoulder
pretexting is what?
when an attacker calls or communicates with a victim and uses social engineering, pretending to be a customer that needs their password or secure document. gets private info.
DOS is what?
denial of service attack: flood of messages are sent from an attacker to a victim causing the victim server to deny access to legitimate customers or flat out crashes. each server has a limited amount of resources to supply to connecting devices.
DDOS is what?
distributed denial of service attack.: this is a denial of service attack that is used by a botnet (group of pre-hacked computers under the control of the hacker) to send connection requests to a victim computer. this causes the computer/ server to crash or denies customers of a connection while providing cover for the attacker.
hacker scrips are what/?
programs created by elite hackers to run their hacking techniques to make their hacking easier to do. these programs can be sold or made available to inexperienced user called script kiddies.
script kiddie
a novice hacker that uses pre-made hacking software to hack with.
trans shippers?
people hired to accept packages in the us and then ship them internationally. these packages are bought by criminals that can’t ship internationally and use credit card info that is stolen to get the merchandise.
what is click fraud?
program clicks on an ad repeatedly, generating income for the hosting website.
threat environment?
the types of attackers and attacks companies face