Jose 4 5 Flashcards
(93 cards)
It helps vendors and developers create interoperable network devices and software.
Standardization
It gives network engineers a clear structure to isolate and fix issues.
Troubleshooting
It simplifies the complexity of networking into digestible parts.
Education
It is the protocol suite that runs the internet, intranets, and most local networks today.
TCP/IP (Transmission Control Protocol/Internet Protocol)
A cyber attack aimed at making a computer or device unavailable to its intended users by interrupting normal functioning, typically by overwhelming it with requests.
Denial-of-Service (DoS) Attack
Exploit memory buffer vulnerabilities, consuming resources like hard disk space or CPU time, causing system slowdowns or crashes.
Buffer Overflow Attack
Overwhelm the target with excessive network packets, using more bandwidth than the target can handle, causing service denial.
Flood Attack
Involves using a broadcast address to send spoofed packets, flooding the target IP address.
Smurf Attack
Overwhelms a target with excessive ICMP (ping) packets, disrupting its ability to respond efficiently.
Ping Flood
Sends a malformed packet that causes system crashes or other harmful behaviors.
Ping of Death
An attack that attempts to disrupt an online service by flooding it with traffic from one source.
DoS Attack
An attack that aims to disrupt an online service by flooding it with traffic from multiple sources.
DDoS Attack
A hacker secretly intercepting or altering communication between two parties to steal data without their knowledge.
Man-in-the-Middle (MitM) Attack
Hackers impersonate banks or companies via email to steal data or money.
Email Hijacking
Fake public Wi-Fi networks used to spy on users and steal sensitive data.
Wi-Fi Eavesdropping
Redirects users to fake websites to steal login credentials.
DNS Spoofing
Steals session cookies after login to hijack user sessions.
Session Hijacking
Exploits outdated SSL protocols to intercept encrypted data.
SSL Hijacking
Sends fake ARP messages to reroute traffic through the attacker’s device.
ARP Cache Poisoning
Fakes IP addresses to trick users into visiting malicious sites.
IP Spoofing
Accesses browser cookies (with other methods) to steal passwords or credit card info.
Cookie Theft
A network security tool that controls incoming and outgoing traffic based on predefined security rules, acting as a checkpoint between trusted internal networks and potential external threats.
Firewall
A system that detects potential threats and vulnerabilities by monitoring network traffic and alerting administrators without interfering with data flow.
Intrusion Detection System (IDS)
Monitors traffic across the entire network.
Network-based IDS (NIDS)