Chapter 14 Flashcards
It prevents users from accessing the network and/or its resources. p474
Denial of Service (DoS)
What is Ping of Death p474
Ping of Death attack, a humongous ICMP packet is sent to the remote host victim, totally flooding the victim’s buffer and causing the system to reboot or helplessly hang there, drowning.
It’s a version of a DoS attack that floods its victim with spoofed broadcast ping messages. p477
Smurf
Its also a DoS attack that inundates the receiving machine with lots of meaningless packets. p478
SYN Flood
What’s Stacheldraht p478
This is actually a mélange of techniques that translates from the German word for barbed wire. It basically incorporates TFN and adds a dash of encryption to the mix.
What is IP Spoofing p481
is the process of sending packets with a fake source address that makes it look like those packets actually originate from within the network that the hacker is trying to attack.
What is a Brute-Force Attacks p482
is another software-oriented attack that employs a program running on a targeted network that tries to log in to some type of shared network resource like a server.
What does Viruses do. p484
A key trait of viruses is that they can’t replicate themselves to other computers or systems without a user doing something like opening an executable attachment in an email to propagate them.
attacks executable application and system program files like those ending in .COM, .EXE, and .DLL. p485
File Viruses
one that affects both the boot sector and files on your computer, making such a virus particularly dangerous and exasperatingly difficult to remove. p486
Multipartite Viruses
is basically a script of commonly enacted commands used to automatically carry out tasks without requiring a user to initiate them. pp486
Macro Viruses
work their way into the master boot record that’s essentially the ground-zero sector on your hard disk where applications aren’t supposed to live. p486
Boot-Sector Viruses
On-access scan An on-access scan runs in the background when you open a file or use a program in situations like these: p517
Insert a floppy disk or thumb drive
Download a file with FTP
Receive email messages and attachments
View a web page
Before you initiate an on-demand scan, be sure that you have the oldest virus definitions. p517 T/F
False You must have the latest.
is the process that an antivirus program deploys to examine a computer suspected of having a virus, identify the virus, and then get rid of it. p517
antivirus scan