Attacks and Malware

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/14

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

15 Terms

1
New cards

Keylogging

Record individuals keystrokes. Malicious purposes like stealing users login info, identity theft / softwarebased can normally be detected by software. Wireless keyboard is more likely to have to have this problem

2
New cards

Back door attack

When a programmer leaves an opening in the system, hackers can exploit that vulnerability

3
New cards

DNS Poisoning

Injecting a bogus destination instead of the correct IP addresses to reroute to a fake address.

4
New cards

IP Spoofing

Manipulating the source IP to make another fake source look legit.

5
New cards

Man in the Middle

Intercepting data during transmission. Captured and manipulated or rerouted.

6
New cards

Replay attack

Steal session/auth cookie to get back into your session/restablish

7
New cards

Bad Encryption Keys

Compromised key/gain access to encrypted data

8
New cards

Buffer Overflow

Memroy space overload

9
New cards

Cross site Scripting Attack XSS

Injecting script to bypass websites security mechanism / even if website trusted

10
New cards

Remote code execution attack

The target is in a remote location and exploits software or new vuln to run malicious code

11
New cards

SQL Injection Attack

Use SQL code to get to SQL database, through running the SQL statements on online forms and logins

12
New cards

Password Cracking

Brute force and dictionary attack

13
New cards

Email bombing

Spamming a bunch of emails to give no more availability

14
New cards

Trojan Horse

Looks like a real application/website

15
New cards

rootkit

Written and operates on operating system sec level/no detected, IntoCPU hardware