Hacking Terminology. Mark R. Adams, CISSP KPMG LLP

Similar documents
CompTIA Security+ Malware. Threats and Vulnerabilities Vulnerability Management

Ethical Hacking and Prevention

e-commerce Study Guide Test 2. Security Chapter 10

ETHICAL HACKING & COMPUTER FORENSIC SECURITY

AURA ACADEMY Training With Expertised Faculty Call Us On For Free Demo

GCIH. GIAC Certified Incident Handler.

Certified Ethical Hacker (CEH)

SANS Exam SEC504 Hacker Tools, Techniques, Exploits and Incident Handling Version: 7.1 [ Total Questions: 328 ]

Security+ Practice Questions Exam Cram 2 (Exam SYO-101) Copyright 2004 by Que Publishing. International Standard Book Number:

SINGLE COURSE. NH9000 Certified Ethical Hacker 104 Total Hours. COURSE TITLE: Certified Ethical Hacker

INF3700 Informasjonsteknologi og samfunn. Application Security. Audun Jøsang University of Oslo Spring 2015

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline

CISNTWK-440. Chapter 4 Network Vulnerabilities and Attacks

19.1. Security must consider external environment of the system, and protect it from:

CERT-In. Indian Computer Emergency Response Team ANTI VIRUS POLICY & BEST PRACTICES

CTS2134 Introduction to Networking. Module 08: Network Security

Exam : JK Title : CompTIA E2C Security+ (2008 Edition) Exam. Version : Demo

Cyber Security & Ethical Hacking Training. Introduction to Cyber Security Introduction to Cyber Security. Linux Operating System and Networking: LINUX

Protection and Security

Language-Based Protection

Curso: Ethical Hacking and Countermeasures

Security and Authentication

MU2a Authentication, Authorization & Accounting Questions and Answers with Explainations

Intruders. significant issue for networked systems is hostile or unwanted access either via network or local can identify classes of intruders:

Operating systems and security - Overview

Operating systems and security - Overview

Security Threats: Network Based Attacks

Operating System Security. 0Handouts: Quizzes ProsoftTraining All Rights Reserved. Version 3.07

Guide to Network Security First Edition. Chapter One Introduction to Information Security

Data Communication. Chapter # 5: Networking Threats. By: William Stalling

The Security Problem

Web Security. Outline

Protection and Security

DumpsTorrent. Latest dumps torrent provider, real dumps

CompTIA Security+(2008 Edition) Exam

Computer Forensics: Investigating Network Intrusions and Cyber Crime, 2nd Edition. Chapter 3 Investigating Web Attacks

SPOOFING. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

Chapter 15: Security. Operating System Concepts 8 th Edition,

Computer Security: Principles and Practice

The Protocols that run the Internet

ANTIVIRUS SITE PROTECTION (by SiteGuarding.com)

Web insecurity Security strategies General security Listing of server-side risks Language specific security. Web Security.

Ethical Hacking and Countermeasures: Web Applications, Second Edition. Chapter 3 Web Application Vulnerabilities

Systems and Network Security (NETW-1002)

Introduction to Security. Computer Networks Term A15

SANS SEC504. Hacker Tools, Techniques, Exploits and Incident Handling.

Module 20: Security. The Security Problem Authentication Program Threats System Threats Threat Monitoring Encryption. Operating System Concepts 20.

Chapter 4. Network Security. Part I

2. INTRUDER DETECTION SYSTEMS

Protection and Security. Sarah Diesburg Operating Systems CS 3430

ExecutivePerils CYBER INSURANCE TERMS & DEFINITIONS

Why Firewalls? Firewall Characteristics

Wireless LAN Security (RM12/2002)

Network Fundamentals. Chapter 7: Networking and Security 4. Network Fundamentals. Network Architecture

CS System Security Mid-Semester Review

A. It provides special tunneling, such as UDP to TCP, with the possibility of specifying all network parameters.

IDS: Signature Detection

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8

Overview. Handling Security Incidents. Attack Terms and Concepts. Types of Attacks

Accounting Information Systems

Firewalls 1. Firewalls. Alexander Khodenko

Computer Network Vulnerabilities

Security, Privacy and Authentication. Michael Power Gowling Lafleur Henderson LLP

Security Concerns in Automotive Systems. James Martin

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 3 Protecting Systems

ANTIVIRUS SITE PROTECTION (by SiteGuarding.com)

Internet Security: Firewall

ISO/IEC Common Criteria. Threat Categories

DIS10.1 Ethical Hacking and Countermeasures

Chapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each.

COPYRIGHTED MATERIAL. Contents. Part I: The Basics in Depth 1. Chapter 1: Windows Attacks 3. Chapter 2: Conventional and Unconventional Defenses 51

Point ipos Implementation Guide. Hypercom P2100 using the Point ipos Payment Core Hypercom H2210/K1200 using the Point ipos Payment Core

CS System Security 2nd-Half Semester Review

Mobile MOUSe HACKING REVEALED ONLINE COURSE OUTLINE

ECCouncil Certified Ethical Hacker. Download Full Version :

NETWORK THREATS DEMAN

Pass Microsoft Exam

Firewall Identification: Banner Grabbing

Security Testing. Who, What, When and How of Security Testing. Heidi Harmes-Campbell.

Network Security Issues and New Challenges

Security System and COntrol 1

Lecture 12. Application Layer. Application Layer 1

Standard Categories for Incident Response (definitions) V2.1. Standard Categories for Incident Response Teams. Definitions V2.1.

1/11/11. o Syllabus o Assignments o News o Lecture notes (also on Blackboard)

NETWORK INTRUSION. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

Web Application Security. Philippe Bogaerts

Chapter 10: Security and Ethical Challenges of E-Business

BCS Level 4 Certificate in Network Security QAN 603/0546/0

SE420 Software Quality Assurance

CS 356 Operating System Security. Fall 2013

PrepAwayExam. High-efficient Exam Materials are the best high pass-rate Exam Dumps

NETWORK SECURITY. Ch. 3: Network Attacks

ECCouncil Exam v8 Certified Ethical Hacker v8 Exam Version: 7.0 [ Total Questions: 357 ]

Exam4Tests. Latest exam questions & answers help you to pass IT exam test easily

Practice Labs Ethical Hacker

Last time. Security Policies and Models. Trusted Operating System Design. Bell La-Padula and Biba Security Models Information Flow Control

Feasibility study of scenario based self training material for incident response

W is a Firewall. Internet Security: Firewall. W a Firewall can Do. firewall = wall to protect against fire propagation

What is Authentication? All requests for resources have to be monitored. Every request must be authenticated and authorized to use the resource.

INTRODUCTION ON D-DOS. Presentation by RAJKUMAR PATOLIYA

Transcription:

Hacking Terminology Mark R. Adams, CISSP KPMG LLP

Backdoor Also referred to as a trap door. A hole in the security of a system deliberately left in place by designers or maintainers. Hackers may also leave back doors in systems they have compromised so they can return at a later time.

Banner Grabbing The practice of obtaining the logon banners from target systems in order to find out what operating systems, versions, and patch levels they are running. This allows an attacker to focus his attack.

Brute Force A method that relies on sheer computing power to try all possibilities until the solution to a problem is found. Usually refers to cracking passwords by trying every possible combination of a particular key space.

Buffer Overflow What happens when you try to stuff more data into a buffer (holding area) than it can handle. This problem is commonly exploited by crackers to get arbitrary commands executed by a program running with root permissions.

Chipping Configuring processors or other computer chips so that they contain some unexpected functions. For example, they could be built so that they fail after a certain time, blow up after they receive a signal on a specific frequency, or send radio signals that allow identification of their exact location.

DoS Attack An abbreviation for Denial of Service, DoS refers to an attempt to shut down access to a particular system or network. The target is usually a high-profile web site or e-commerce site.

DDoS An abbreviation for Distributed Denial of Service, DDoS refers to a coordinated DoS attack where a number of hosts are directed to attack a single target at the same time. The success of the attack is based on the large number of attacking hosts.

Logic Bomb A bomb is a type of Trojan horse, used to release a virus, a worm or some other system attack. It's either an independent program or a piece of code that's been planted by a system developer or programmer.

Orange Book Officially called the Trusted Computer System Evaluation Criteria (TCSEC) from the DoD. It presents the security requirements that a host must meet in order to be considered by the DoD a trusted system. There are various levels, ranging from A to D

C2 Security Level Refers to a security rating of the Orange Book. Class C2 is titled Controlled Access Protection, and it refers to systems that make users individually accountable for their actions through login procedures, auditing of security-relevant events, and resource isolation.

Red Book Officially called the Trusted Network Interpretation (TNI) from the DoD. With the TNI, the security requirements and rating structure of the TCSEC are extended to networks of computers, ranging from local area networks to wide area networks.

Port Redirection The process of redirecting network traffic from one IP address / port to another IP address / port. This is normal for firewalls and proxy servers, but hackers will sometimes do this in order to circumvent firewalls or secure ports.

Session Hijacking A process where an attacker takes over, or hijacks, an existing connection between a client and server. This allows that attacker to execute commands on the server as if he were the real client. Easily performed on Telnet sessions.

Spoofing The process of impersonating another host on a network, including the Internet, by using that hosts IP or MAC address. This can enable the spoofer to mask an attack, or it can enable him to access another host with little or no authentication by pretending to be a trusted host.

Trojan Horse A code fragment that hides inside a program and performs a disguised function. It's a popular mechanism for disguising a virus or a worm.

Virus A code fragment that copies itself into a larger program, modifying that program. A virus executes only when its host program begins to run. The virus then replicates itself, infecting other programs as it reproduces.

Worm A worm is an independent program. It reproduces by copying itself in full-blown fashion from one computer to another, usually over a network. Unlike a virus, it usually doesn't modify other programs.