Erstellt von Shantal K Green
vor mehr als 4 Jahre
|
||
Frage | Antworten |
Spoofing | The word "spoof" means to hoax, trick, or deceive. Therefore, in the IT world, spoofing refers tricking or deceiving computer systems or other computer users. ... E-mail spoofing involves sending messages from a bogus e-mail address or faking the e-mail address of another user. |
Phishing | phishing is a term used to describe a malicious individual or group of individuals who scam users. They do so by sending e-mails or creating web pages that are designed to collect an individual's online bank, credit card, or other login information. |
Sniffing | Sniffing is a process of monitoring and capturing all data packets passing through given network. Sniffers are used by network/system administrator to monitor and troubleshoot network traffic. Attackers use sniffers to capture data packets containing sensitive information such as password, account information etc. |
Hyjacking | hijack refers to taking control over something and causing it to do something else. The most common type of hijacking is when malware infects your computer and redirects your web browser, homepage, or search engine to a malicious site or somewhere you don't want to be. |
Footprinting | (also known as reconnaissance) is the technique used for gathering information about computer systems and the entities they belong to. To get this information, a hacker might use various tools and technologies. This information is very useful to a hacker who is trying to crack a whole system. |
Flooding | a simple routing technique in computer networks where a source or node sends packets through every outgoing link. Flooding, which is similar to broadcasting, occurs when source packets (without routing data) are transmitted to all attached network nodes. |
Buffering Overflow | or buffer overrun, is an anomaly where a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory locations. |
Backdoor | a typically covert method of bypassing normal authentication or encryption in a computer, product, embedded device, or its embodiment. Backdoors are most often used for securing remote access to a computer, or obtaining access to plaintext in cryptographic systems. |
Zero Day Attack | a flaw in software, hardware or firmware that is unknown to the party or parties responsible for patching or otherwise fixing the flaw. The term zero day may refer to the vulnerability itself, or an attack that has zero days between the time the vulnerability is discovered and the first attack. |
CSRF | Cross-site request forgery, also known as one-click attack or session riding and abbreviated as CSRF (sometimes pronounced sea-surf) or XSRF, is a type of malicious exploit of a website where unauthorized commands are transmitted from a user that the web application trusts. |
Möchten Sie mit GoConqr kostenlos Ihre eigenen Karteikarten erstellen? Mehr erfahren.