Week 5 Flashcards
Attackers place a high priority on targeting networks in their attacks.
Networking-Based Attacks
This is essentially what happens in a network _____________ attack, which is a deliberate attempt to prevent authorized users from accessing a system by overwhelming that system with requests.
denial of service (DoS)
A __________ attack takes advantage of the procedures for initiating a session.
SYN flood attack
Some attacks are designed to intercept network communications.
Interception
____________ attack by intercepting legitimate communication and forging a fictitious response to the sender.
Man-in-the-middle
A ______ attack is similar to a passive man-in-the-middle attack.
Replay Attack
is the act of introducing a substance that harms or destroys a functional living organism.
Poisoning
TCP/IP requires that logical IP addresses be assigned to each host on a network.
ARP Poisoning
The predecessor to today’s Internet was a network known as ARPAnet.
DNS Poisoning
Access rights are privileges to access hardware and software resources that are granted to users.
Attacks on Access Rights
Operating systems and many applications have the ability to restrict a user’s privileges in accessing its specific functions.
Privilege Escalation
is defined as a relation with a property so that if a relation exists between A and B, and there is also a relation between B and C, then there is a relation between A and C.
Transitive Access