Denial of Service
-Hammering a website’s equipment with too many requests for information
Clogging the system, slowing performance or even crashing the site.
Scans
-Widespread probes of the Internet to determine types of computers, services, and connections Looking for weaknesses.
Sniffer
-Programs that search individual packets of data as they pass through the Internet
Capturing passwords or entire contents.
Spoofing
-Faking an e-mail address or Web page to trick users into passing along critical information like passwords or credit card numbers.
Trojan Horse
-A program that, unknown to the user, contains instructions that exploit a known vulnerability in some software
Back Doors
-A hidden point of entry to be used in case the original entry point has been detected or blocked.
Malicious Applets
-Tiny Java programs that misuse your computer’s resources, modify files on the hard disk, send fake e-mail, or steal passwords.
War Dialing
-Programs that automatically dial thousands of telephone numbers in search of a way in through a modem connection.
Logic Bombs
-An instruction in a computer program that triggers a malicious act.
Buffer Overflow
-A technique for crashing or gaining control of a computer by sending too much data to the buffer in a computer’s memory.
Password Crackers
-Software that can guess passwords.
Social Engineering
-Gaining access to computer systems.
-By talking unsuspecting company employees out of valuable information such as passwords.
Dumpster Diving
-Sifting through a company’s garbage to find information to help break into their computers.
0 comments:
Post a Comment
Thank You For Comment...