1/14
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Keylogging
Record individuals keystrokes. Malicious purposes like stealing users login info, identity theft / softwarebased can normally be detected by software. Wireless keyboard is more likely to have to have this problem
Back door attack
When a programmer leaves an opening in the system, hackers can exploit that vulnerability
DNS Poisoning
Injecting a bogus destination instead of the correct IP addresses to reroute to a fake address.
IP Spoofing
Manipulating the source IP to make another fake source look legit.
Man in the Middle
Intercepting data during transmission. Captured and manipulated or rerouted.
Replay attack
Steal session/auth cookie to get back into your session/restablish
Bad Encryption Keys
Compromised key/gain access to encrypted data
Buffer Overflow
Memroy space overload
Cross site Scripting Attack XSS
Injecting script to bypass websites security mechanism / even if website trusted
Remote code execution attack
The target is in a remote location and exploits software or new vuln to run malicious code
SQL Injection Attack
Use SQL code to get to SQL database, through running the SQL statements on online forms and logins
Password Cracking
Brute force and dictionary attack
Email bombing
Spamming a bunch of emails to give no more availability
Trojan Horse
Looks like a real application/website
rootkit
Written and operates on operating system sec level/no detected, IntoCPU hardware