Thursday, August 12, 2010

Understanding the ideas.

Social engineering is the act of manipulating people into performaing actionsor divulgent cofidential information. Similar to confidence trick and fraud.

Salami slicing is a series of many minor actions, often performed by clandestine means, that together results in a larger action that would be difficult or illegal to perform at once.

A Trojan horse is malware that appears to perform a desirable function for the user prior to run or install but instead facilitates unauthorized access of the user's computer system

A Distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system.

A Sniffer (Network Analyzer) is a piece of software that can look at network traffic, decode it, and give meaningful data that a network administrator can use to diagnose problems on a network

IP spoofing refers to the creation of Internet Protocol (IP) packets with a forged source IP address, called spoofing, with the purpose of concealing the identity of the sender or impersonating another computing system.

A brute force attack is a strategy used to break the encryption of data. It involves traversing the search space of possible keys until the correct key is found.

Shoulder surfing refers to using direct observation techniques, such as looking over someone's shoulder, to get information.

Sabotage is a deliberate action aimed at weakening another entity through subversion, obstruction, disruption, or destruction.

Electromagnetic interference is the disruption of operation of an electronic device when it is in the vicinity of an electromagnetic field (EM field) in the radio frequency (RF) spectrum that is caused by another electronic device.

No comments:

Post a Comment