Threats, Attacks, and Vulnerabilities (Ch.9) Flashcards
Protocol used to map known IP addresses to unknown physical addresses.
Address Resolution Protocol (ARP)
An attack that convinces the network that the attacker’s MAC (Media Access Control) address is the one associated with an allowed address so that traffic is wrongly sent to attacker’s address.
Address Resolution Protocol (ARP) poisoning
Software that gathers information to pass on to marketers or that intercepts personal data such as credit card numbers and makes it available to third parties.
adware
Software that identifies the presence of a virus and is capable of removing or quarantining the virus.
antivirus software
A virus that is protected in a way that makes disassembling it difficult. The difficulty makes it “armored” against antivirus programs that have trouble getting to, and understanding, its code.
armored virus
Any unauthorized intrusion into the normal operations of a computer or computer network.
attack
Minimizing the possibility of exploitation by reducing the amount of code and limiting potential damage.
attack surface reduction (ASR)
An opening left in a program application (usually by the developer) that allows additional access to data.
backdoor
An automated software program that collects information on the web. usually a compromised computer being controlled remotely.
bot
A type of denial-of-service (DoS) attack that targets poor memory management on a server or application
buffer overflow
Using multiple transparent or opaque layers to trick a user into clicking a button or link on another page when they had intended to click on the top page.
clickjacking
A virus that creates a new program that runs in the place of an expected program of the same name.
companion virus
A form of web-based attack in which unauthorized commands are sent from a user that a website trusts.
cross-site request forgery (XSRF)
Running a script routine on a user’s machine from a website without their permission.
cross-site scripting (XSS)
A type of attack that prevents any users—even legitimate ones—from using a system.
denial-of-service (DoS)
The act of attempting to crack passwords by testing them against a list of dictionary words.
dictionary attack
A derivative of a DoS attack in which multiple hosts in multiple locations all focus on one target to reduce its availability to the public.
distributed denial-of-service (DDoS)
An attack method in which a daemon caches DNS reply packets, which sometimes contain other information (data used to fill the packets). The extra data can be scanned for information useful in a break-in or man-in-the-middle attack.
DNS poisoning
The DNS server is given information about a name server that it thinks is legitimate when it isn’t.
DNS spoofing
The network service used in TCP/IP networks that trans-lates hostnames to IP addresses.
Domain Name System (DNS)