Chapter 14 - Network Threats and Mitigation Flashcards
it prevents users from accessing the
network and/or its resources.
Denial of Service (DoS)
used to see whether a computer is responding to IP requests.
The Ping of Death
version of a DoS attack that floods its victim with spoofed broadcast ping messages.
Smurf
DoS attack that inundates the receiving machine with
lots of meaning-less packets.
SYN Flood
they initiate synchronized DoS attacks from multiple sources and
can target multiple devices.
Tribe Flood Network (TFN) and Tribe Flood Network 2000 (TFN2K)
are basically little programs that can display a
message, delete files, or even send out huge amounts of meaningless data over a network to block legitimate messages.
Viruses
do their damage by replacing some or all of the
targetprogram’s code with their own. Executable on files ending in
.COM, .EXE, and .DLL.
File Viruses
automatically carry out tasks without requiring a
user to initiate them, usually harmless. (i.e. Visual Basic macro-
scripting)
Macro Viruses
overwrite your boot sector, making it
appear as if there’s no pointer to your operating system. Missing
Operating System or Hard Disk Not Found error message.
Boot-Sector Viruses
affects both the boot sector and files (i.e.Anthrax and Tequila)
Multipartite Viruses
fake source address packets.
IP Spoofing
holes in software that’s running on our
servers.
Application-Layer Attacks
miniature programs contain viruses, or snoop, or spyware programs.
Active-X Attacks
a rootkit to probe, scan, and then capture data.
Autorooters
hacker can use their previously placed inroads into a
specific host or a network whenever they want to.
Backdoors