Attacks Flashcards
Sniffing
hjk
Man in the Middle
hjk
DoS
hjk
Smurf
hjk
Fraggle
hjk
SYN Flood
hjk
Broadcast Storms
hjk
Ping of Death
hjk
Dial Tone
hjk
War Driving
hjk
Evil Twin
hjk
Bluesnarfing
hjk
Bluejacking
hjk
DDoS
hjk
Replay/Playback
hjk
Brute Force
hjk
Malicious Port Scanning
hjk
Backdoor 1
provides another way of accessing a system
Backdoor 2
hjk
Virus
A set of malicious code that attaches itself to a host application. Once the host application is executed, the malicious code executes as well. (Chapter 6)
Worm
a self-replicating malware that resides in memory. It uses different transport protocols to travel over the network and consumes network bandwidth.
Trojan Horse
appears to be something useful but includes a malicious component, such as installing a backdoor on a system. Many Trojans are delivered via drive-by downloads.
Ransomeware
A type of Trojan. Attackers take control of a user’s computer and then demands a ransome
Logic Bomb
a string of code embedded into an application/script that executes in response to an event.