Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
20 Cards in this Set
- Front
- Back
UNAUTHORIZED ACCESS
|
ANY TYPE OF NETWORK OR DATA ACCESS THAT IS NOT EXPLICITLY APPROVED BY THE ORGANIZATION
|
|
DATA THEFT
|
A TYPE OF ATTACK IN WHICH UNAUTHORIZED ACCESS IS USED TO OBTAIN PROTECTED NETWORK INFORMATION
|
|
SNIFFER
|
A DEVICE OR PROGRAM THAT MONITORS NETWORK COMMUNICATIONS AND CAPTURES DATA
|
|
PASSWORD ATTACK
|
ANY TYPE OF UNAUTHORIZED EFFORT TO DISCOVER A USER'S VALID PASSWORD
|
|
BRUTE FORCE PASSWORD ATTACK
|
A METHOD OF GUESSING PASSWORDS BY USING SOFTWARE THAT SYSTEMATICALLY GENERATES PASSWORD COMBOS UNTIL A VALID ON IS FOUND
|
|
TROJAN HORSE ATTACK
|
AN ATTEMPT TO GAIN UNAUTHORIZED ACCESS THROUGH THE USE OF A TROJAN HORSE PROGRAM
|
|
SPOOFING ATTACK
|
A TYPE OF ATTACK IN WHICH A DEVICE OUTSIDE THE NETWORK SES AN INTERNAL NETWORK ADDRESS TO MASQUERADE AS A DEVICE INSIDE THE NETWORK
|
|
SESSION HIJACKING ATTACK
|
A TYPE OF SPOOFING IN WHICH THE ATTACKER TAKES OVER AN EXISTING NETWORK COMMUNICATION SESSION BETWEEN TWO DEVICES AFTER THE SESSION HAS ALREADY BEEN AUTHENTICATED
|
|
MAN-IN-THE-MIDDLE ATTACK
|
A DATA-THEFT TECHNIQUE IN WHICH THE ATTACKER INTERPOSES A DEVICE BETWEEN TWO LEGITIMATE HOSTS TO GAIN ACCESS TO THEIR DATA TRANSMISSION
|
|
DENIAL OD SERVICE (DoS) ATTACK
|
AN ATTACK THAT IS MOUNTED FOR THE PURPOSE OF DISABLING SYSTEMS THAT PROVIDE NETWORK SERVICES, RATHER THAN STEAL DATA OR INFLICT DAMAGE.
|
|
DISTRIBUTED DENIAL OF SERVICE (DDoS)
|
A TYPE OF DoS ATTACK THAT USES MULTIPLE COMPUTERS ON DISPARATE NETWORKS TO LAUNCH THE ATTACK FROM MANY SIMULTANEOUS SOURCES
|
|
SOCIAL ENGINEERING ATTACK
|
NON-TECHNICAL ATTACK IN WHICH THE ATTACKER ATTEMPTS TO OBTAIN INFO DIRECTLY FROM NETWORK USERS BY EMPLOYING DECEPTION AND TRICKERY.
|
|
BOOT SECTOR VIRUS
|
WRITES ITSELF INTO THE BOOT SECTOR OF A FLOPPY DISK. WHEN A SYSTEM ATTEMPTS TO BOOT, THE VIRUS IS MOVED ONTO THE SYSTEM
|
|
FILE INFECTING
|
INFECTS EXE PROGRAMS AND USES OS RESOURCES TO PROPAGATE ITSELF
|
|
MACRO
|
A GROUP OF APPLICATION-SPECIFIC INSTRUCTIONS THAT EXECUTES AS A GROUP WITHIN THE SPECIFIC APP
|
|
MAILER AND MASS MAILER
|
SENDS ITSELF TO OTHER USERS THROUGH EMAIL SYSTEMS
|
|
POLYMORPHIC
|
CAN CHANGE AS IT MOVES AROUND, ACTING DIFFERENTLY ON DIFFERENT SYSTEMS
|
|
SCRIPT
|
A SMALL PROGRAM THAT RUNS CODE USING THE WINDOWS SCRIPTING HOST ON WINDOWS OS
|
|
STEALTH
|
MOVES AND ATTEMPTS TO CONCEAL ITSELF UNTIL IT CAN PROPAGATE.
|
|
WORM
|
A SELF-CONTAINED PROGRAM THAT SPREADS AND CAN EXIST WITHOUT A CARRIER FILE. IT DETECTS A CONNECTION AND EST. COMMUNICATIONS WITH OTHER DEVICES ON ITS OWN.
|