Network Attacks Flashcards
Man-in-the-Middle
An attacker secretly relays and possibly alters the communications between two unsuspecting parties.
Logic Bomb
A piece of computer code intentionally inserted into system software that will set off a malicious function when specified conditions are met.
DOS
An attempt to overload a system and prevent all legitimate request from being fulfilled.
Spyware
Software that aims to gather information about a person or organization with out their knowledge.
Phishing
A fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity.
Rootkit
A collection of malicious software designed to enable access to a computer or area of its software that is not allowed, and often masks its existence.
Trojan Horse
Malware which misleads users of its true intent.
Ransomware
A type of malware that threatens to publish or perpetually block access to a persons data unless a ransom is paid.
Backdoor
A covert method of bypassing normal authentication or encryption in a computer product.
VLAN Hopping
An attacking host on one VLAN gains access to traffic on other VLANs by switch spoofing and double tagging.