IST 233 Study Guide - Midterm Guide: Malware, Phishing, Intrusion Detection System

36 views4 pages

Document Summary

Viruses; worms; spyware; spam; social engineering; phishing; mobile code; Describe the key phases of a hacking effort: scanning (reconnaissance); break-in; exit/cover-up. Explain the different types of hackers/attackers that enterprises may face: hacking is intentionally using a computer without authorization. First they must follow scanning phase, pinging all ip addresses and see which respond. Then, the break-in uses exploit, a tailored attack method usually as a program, sending exploit packets to vulnerability. Explain how dos attacks and botnets can be used as an element of a cyber-warfare plan: a bot is a general exploitation program that you can control remotely. Dos attacks make comp, or entire networks unavailable to legitimate users. Distributed dos use bots to infest and shutdown systems. Who developed it and what are the implications of this: zero day attacks are attacks that occur before a vendor releases a patch to fix vulnerability. No way to know in advance or fix it.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers

Related Documents