Jump to content

User:Emperorneo/Books/Information Security Attacks

From Wikipedia, the free encyclopedia


Information Security Attacks

[edit]

Identifying and Understanding Atacks and how to Mitigation Them

[edit]
Spoofing attack
IP address spoofing
ARP spoofing
Man-in-the-middle attack
Referer spoofing
Caller ID spoofing
Email spoofing
MAC spoofing
Phishing
IDN homograph attack
Protocol spoofing
Stream cipher attack
Website spoofing
Computer Attacks
Attack (computing)
Telephone tapping
Port scanner
Idle scan
Denial-of-service attack
Ping flood
Ping of death
Smurf attack
Buffer overflow
Heap overflow
Stack overflow
Uncontrolled format string
Exploit (computer security)
Computer security
Backdoor (computing)
Tampering (crime)
Privilege escalation
Clickjacking
Computer virus
Botnet
Comparison of computer viruses
Keystroke logging
Malware
Multipartite virus
Trojan horse (computing)
Exploit kit