Integrity Flashcards
Technology that supports Integrity
Hashing
MD5
Message Digest 5
128-bit hash digests
SHA-1
Secure Hash Algorithm 1
160-bit hash digests
Salami Attack
Collection of small attacks that combine for a larger attack.
Data Diddling
Data is changed before it is stored.
Virus, Trojan horse, or worm could change characters from what is displayed on screen
Trust Relationship Exploitation
Compromise a device that has access to another device that is harder to reach
Trojan Horse
Appears to be a useful program but has another purpose
Packet Capture
Can see the contents of plain-text packets
Keylogger
Logs the keystrokes made by a user
Brute Force
Tries all possible password combinations.
Dictionary Attack
Tries commonly used words
Botnet
Collection of computers (zombies) infected with software (bots)
Hijacking Session
Hijacking a TCP session