• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/20

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

20 Cards in this Set

  • Front
  • Back
UNAUTHORIZED ACCESS
ANY TYPE OF NETWORK OR DATA ACCESS THAT IS NOT EXPLICITLY APPROVED BY THE ORGANIZATION
DATA THEFT
A TYPE OF ATTACK IN WHICH UNAUTHORIZED ACCESS IS USED TO OBTAIN PROTECTED NETWORK INFORMATION
SNIFFER
A DEVICE OR PROGRAM THAT MONITORS NETWORK COMMUNICATIONS AND CAPTURES DATA
PASSWORD ATTACK
ANY TYPE OF UNAUTHORIZED EFFORT TO DISCOVER A USER'S VALID PASSWORD
BRUTE FORCE PASSWORD ATTACK
A METHOD OF GUESSING PASSWORDS BY USING SOFTWARE THAT SYSTEMATICALLY GENERATES PASSWORD COMBOS UNTIL A VALID ON IS FOUND
TROJAN HORSE ATTACK
AN ATTEMPT TO GAIN UNAUTHORIZED ACCESS THROUGH THE USE OF A TROJAN HORSE PROGRAM
SPOOFING ATTACK
A TYPE OF ATTACK IN WHICH A DEVICE OUTSIDE THE NETWORK SES AN INTERNAL NETWORK ADDRESS TO MASQUERADE AS A DEVICE INSIDE THE NETWORK
SESSION HIJACKING ATTACK
A TYPE OF SPOOFING IN WHICH THE ATTACKER TAKES OVER AN EXISTING NETWORK COMMUNICATION SESSION BETWEEN TWO DEVICES AFTER THE SESSION HAS ALREADY BEEN AUTHENTICATED
MAN-IN-THE-MIDDLE ATTACK
A DATA-THEFT TECHNIQUE IN WHICH THE ATTACKER INTERPOSES A DEVICE BETWEEN TWO LEGITIMATE HOSTS TO GAIN ACCESS TO THEIR DATA TRANSMISSION
DENIAL OD SERVICE (DoS) ATTACK
AN ATTACK THAT IS MOUNTED FOR THE PURPOSE OF DISABLING SYSTEMS THAT PROVIDE NETWORK SERVICES, RATHER THAN STEAL DATA OR INFLICT DAMAGE.
DISTRIBUTED DENIAL OF SERVICE (DDoS)
A TYPE OF DoS ATTACK THAT USES MULTIPLE COMPUTERS ON DISPARATE NETWORKS TO LAUNCH THE ATTACK FROM MANY SIMULTANEOUS SOURCES
SOCIAL ENGINEERING ATTACK
NON-TECHNICAL ATTACK IN WHICH THE ATTACKER ATTEMPTS TO OBTAIN INFO DIRECTLY FROM NETWORK USERS BY EMPLOYING DECEPTION AND TRICKERY.
BOOT SECTOR VIRUS
WRITES ITSELF INTO THE BOOT SECTOR OF A FLOPPY DISK. WHEN A SYSTEM ATTEMPTS TO BOOT, THE VIRUS IS MOVED ONTO THE SYSTEM
FILE INFECTING
INFECTS EXE PROGRAMS AND USES OS RESOURCES TO PROPAGATE ITSELF
MACRO
A GROUP OF APPLICATION-SPECIFIC INSTRUCTIONS THAT EXECUTES AS A GROUP WITHIN THE SPECIFIC APP
MAILER AND MASS MAILER
SENDS ITSELF TO OTHER USERS THROUGH EMAIL SYSTEMS
POLYMORPHIC
CAN CHANGE AS IT MOVES AROUND, ACTING DIFFERENTLY ON DIFFERENT SYSTEMS
SCRIPT
A SMALL PROGRAM THAT RUNS CODE USING THE WINDOWS SCRIPTING HOST ON WINDOWS OS
STEALTH
MOVES AND ATTEMPTS TO CONCEAL ITSELF UNTIL IT CAN PROPAGATE.
WORM
A SELF-CONTAINED PROGRAM THAT SPREADS AND CAN EXIST WITHOUT A CARRIER FILE. IT DETECTS A CONNECTION AND EST. COMMUNICATIONS WITH OTHER DEVICES ON ITS OWN.