IST 233 Study Guide - Midterm Guide: Malware, Phishing, Intrusion Detection System
Document Summary
Viruses; worms; spyware; spam; social engineering; phishing; mobile code; Describe the key phases of a hacking effort: scanning (reconnaissance); break-in; exit/cover-up. Explain the different types of hackers/attackers that enterprises may face: hacking is intentionally using a computer without authorization. First they must follow scanning phase, pinging all ip addresses and see which respond. Then, the break-in uses exploit, a tailored attack method usually as a program, sending exploit packets to vulnerability. Explain how dos attacks and botnets can be used as an element of a cyber-warfare plan: a bot is a general exploitation program that you can control remotely. Dos attacks make comp, or entire networks unavailable to legitimate users. Distributed dos use bots to infest and shutdown systems. Who developed it and what are the implications of this: zero day attacks are attacks that occur before a vendor releases a patch to fix vulnerability. No way to know in advance or fix it.