chapter 4

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/31

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

32 Terms

1
New cards
  1. Wireless Networking

Technology that enables devices to connect to a network via radio signals

2
New cards
  1. Evil Twin

A fraudulent wireless access point (AP) that masquerades as a legitimate one to intercept data.

3
New cards
  1. Rogue Access Point

Unauthorized wireless access point set up within an organization’s network without administrative approval.

4
New cards
  1. Bluesnarfing

Unauthorized access and theft of data from Bluetooth-enabled devices.

5
New cards
  1. Bluejacking

Sending unsolicited messages or data (like images) to Bluetooth-enabled devices.

6
New cards
  1. Disassociation Attack

An attack that forces a wireless client to disconnect from the network by spoofing de-authentication frames.

7
New cards
  1. Jamming

Deliberate disruption of radio signals to create denial-of-service on wireless networks.

8
New cards
  1. RFID (Radio Frequency Identification)

Wireless use of electromagnetic fields to identify objects tagged with RFID chips.

9
New cards
  1. NFC (Near Field Communication)

Short-range wireless technology for data exchange over distances typically less than 10 cm.

10
New cards
  1. Initialization Vector (IV)

Randomization data used at the beginning of cryptographic processes to ensure unique encryption.

11
New cards
  1. On-path Attack (Man-in-the-middle)

Attacker intercepts and potentially modifies communications between two parties without their knowledge.

12
New cards
  1. Man-in-the-Browser (MITB)

Malware-based attack that manipulates browser behavior to alter transactions or data.

13
New cards
  1. Layer 2 Attacks

Attacks that exploit vulnerabilities at the data link layer

14
New cards
  1. ARP Poisoning

Corrupting ARP caches by sending falsified ARP messages to redirect network traffic.

15
New cards
  1. MAC Flooding

Flooding a network switch with fake MAC addresses to overwhelm its MAC table.

16
New cards
  1. MAC Cloning

Changing a device’s MAC address to bypass security controls or impersonate another device.

17
New cards
  1. DNS (Domain Name System)

Hierarchical system translating human-readable domain names to IP addresses.

18
New cards
  1. Domain Hijacking

Unauthorized modification or theft of domain registration details.

19
New cards
  1. DNS Poisoning (DNS Spoofing)

Inserting false DNS records into a DNS server or cache to redirect traffic.

20
New cards
  1. URL Redirection

Attack technique that directs users from a legitimate URL to a fraudulent site.

21
New cards
  1. Domain Reputation

Assessment of IP/domain behavior indicating reliability or maliciousness.

22
New cards
  1. Distributed Denial-of-Service (DDoS)

Attack where multiple compromised systems flood a target with excessive traffic.

23
New cards
  1. SYN Flooding

DoS attack that exploits TCP three-way handshake

24
New cards
  1. Ping of Death (POD)

DoS attack involving oversized ping packets causing system crashes.

25
New cards
  1. CLDAP Reflection Attack

Amplification DDoS attack using Connectionless Lightweight Directory Access Protocol (CLDAP) responses directed at victims.

26
New cards
  1. Operational Technology (OT)

Networks controlling industrial and physical processes.

27
New cards
  1. Malicious Script Execution

Automated attacks using scripting languages or automation tools.

28
New cards
  1. PowerShell

Windows scripting language integrated with OS for administrative tasks.

29
New cards
  1. Python

Cross-platform scripting language used for automating tasks and cyberattacks.

30
New cards
  1. Bash (Bourne Again Shell)

Linux command interpreter that executes shell commands and scripts.

31
New cards
  1. Macros

Scripted automation within applications like Microsoft Office or PDFs.

32
New cards
  1. Visual Basic for Applications (VBA)

Older Microsoft scripting language used to automate tasks within Office applications.