[ LiB ] |
Types of threats Internal, external, unstructured, and structured.
Types of attacks Reconnaissance, access, denial-of-service (DoS), and distributed DoS (DDoS).
Packet sniffers Compromise networks by monitoring user ID and password data from File Transfer Protocol (FTP), Telnet, and database access.
IP spoofing An attacker modifies packets and pretends to be from a different source.
Trojan horses Mimicking legitimate applications, they are often used for backdoor access to a host.
Virus Attaches itself to program that is used to transmit the virus to users' workstations.
[ LiB ] |