Chap_1-vocab. Flashcards

1
Q

attackers exploit?

A

type of attack used by the attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

traditional attackers motive?

A

for a sense of power, show off skills and petty crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is ip address spoofing?

A

used to hide the ip address of the attacker. false source ip in exploit packets - the attacker can’t receive replies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

chain of attack computer?

A

exploit packets contain the ip address of the last pc that the attack came from. a chain of computers helps hide the original attack computers source ip address by masking it with each computer the signal travels through (like several proxies).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is ip address scanning?

A

an attacker scans the ip address block that the company/ victim owns. then the victim devices responds to ICMP requests (echo and reply msgs) telling the Attacker which ip addresses are active. then the next step tkes place.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

piggybacking is what?

A

following someone through a secure door

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

shoulder surfing?

A

reading pin code over someones shoulder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

pretexting is what?

A

when an attacker calls or communicates with a victim and uses social engineering, pretending to be a customer that needs their password or secure document. gets private info.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DOS is what?

A

denial of service attack: flood of messages are sent from an attacker to a victim causing the victim server to deny access to legitimate customers or flat out crashes. each server has a limited amount of resources to supply to connecting devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DDOS is what?

A

distributed denial of service attack.: this is a denial of service attack that is used by a botnet (group of pre-hacked computers under the control of the hacker) to send connection requests to a victim computer. this causes the computer/ server to crash or denies customers of a connection while providing cover for the attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

hacker scrips are what/?

A

programs created by elite hackers to run their hacking techniques to make their hacking easier to do. these programs can be sold or made available to inexperienced user called script kiddies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

script kiddie

A

a novice hacker that uses pre-made hacking software to hack with.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

trans shippers?

A

people hired to accept packages in the us and then ship them internationally. these packages are bought by criminals that can’t ship internationally and use credit card info that is stolen to get the merchandise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is click fraud?

A

program clicks on an ad repeatedly, generating income for the hosting website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

threat environment?

A

the types of attackers and attacks companies face

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CIA?

A

Confidentiality, Integrity and Accessibility

17
Q

confidentiality?

A

people are not able to read sensitive information while it is on a computer or while in transit over the network.

18
Q

integrity?

A

attackers can not change/ destroy information if they do then the receiver is able to detect it or recover deleted data.

19
Q

compromises?

A

successful attacks (incidents/ breaches in the network)

20
Q

counter measures?

A

tools used to treat attacks, safeguard protections and controls used by IT to reduce/ stop attacks. Preventative, detective and corrective.

21
Q

internet abuse?

A

company policies are violated: porn downloads or excessive usage of internet.