Threat and attack terminology Flashcards
Malicious software that gathers information, intercept personal data and make it available to third parties. Hes primary purposeis to display ads and generate revenue for the creator.
adware
Protocol used to map known IP addresses to unkown physical address
ARP
An attack that convinces the network that the attacker’s MAC address is the one associated with an allowed address so that traffic is wrongly sent to attacker’s address
ARP Poisoning
Software that identifies the presence of Virus
Antivirus
A virus that is protected in a way that makes dissasembiling it difficult.
Armored virus
involves the MAC (Media Access Control) address of the data being faked.
ARP spoofing commonly known as ARP poisoning
Any unauthorized intrusion into the normal operations of a computer or computer network.
attack
The area of an application that is available to users—those who are authenticated and, more importantly, those who are not.
attack surface
An opening left in a program application (usually by the
developer) that allows additional access to data.
backdoor
An automated software program (network robot) that collects information on the web.In its malicious form, is a compromised computer being controlled remotely.
bot
A type of denial-of-service (DoS) attack that occurs when more data is put into a buffer than it can hold, thereby overflowing it
buffer overflow
Using multiple transparent or opaque layers to trick a user into clicking a button or link on another page when they had intended to click on the top page.
clickjacking
A virus that creates a new program that runs in the place
of an expected program of the same name.
companion virus
A form of web-based attack in which unauthorized commands are sent from a user that a website trusts.
cross-site request forgery (XSRF)
Running a script routine on a user’s machine
from a website without their permission.
cross-site scripting (XSS)
A type of attack that prevents any users—even
legitimate ones—from using a system.
DoS
The act of attempting to crack passwords by testing them against a list of dictionary words.
dictionary attack
A derivative of a DoS attack in which
multiple hosts in multiple locations all focus on one target to reduce its availability to the public.
DDoS Distributed denial of service
An attack method in which a daemon caches DNS reply
packets, which sometimes contain other information (data used to fill the packets). The extra data can be scanned for information useful in a break-in or man-in-the-middle attack.
DNS poisoning
The DNS server is given information about a name server that it thinks is legitimate when it isn’t.
DNS Spoofing