Upgrade to remove ads
Terms in this set (44)
A set of rules for how applications under the Microsoft Windows operating
system should share information.
A specific way of implementing ActiveX that runs through the web
browser and functions like a miniature application.
Active X control
Program that provides additional functionality to web browsers. Also called
Part of the TCP/IP protocol for determining the MAC
address based on the IP address.
An attack that allows an attacker to run programs and
execute commands on a different computer.
arbitrary/remote code execution
An attack that corrupts the ARP cache.
A file that is coupled to an email message and often carries malware.
An attack that occurs when a process attempts to store data in
RAM beyond the boundaries of a fixed-length storage buffer.
Buffer overflow attack
An attack that targets vulnerabilities in client applications that interact
with a compromised server or process malicious data.
Injecting and executing commands to execute on a server.
A file on a local computer in which a web server stores user-specific information.
An attack that injects scripts into a web application server to
direct attacks at clients.
Cross-site scripting XSS
An attack that attempts to prevent a system from performing its
normal functions by overwhelming the system with requests.
denial of service DOS
An attack that takes advantage of a vulnerability so that a user can
move from the root directory to restricted directories.
An attack that uses many computers to perform a
distributed denial of service (DDoS)
An attack that substitutes DNS addresses so that the computer is
automatically redirected to an attacker's device.
A hierarchical name system for translating domain names to
Another name for add-on
A cookie that is created from the website currently being viewed.
Another name for locally shared object (LSO).
A list of the mappings of host names to IP addresses
Part of HTTP that is comprised of fields that contain the different
characteristics of the data that is being transmitted.
Modifying HTTP headers to create an attack.
HTTP header manipulation
An attack that is the result of an attacker changing the value of a
variable to something outside the range that the programmer had intended.
integer overflow attack
A cookie that is significantly different in size and location from
regular cookies, and can store more complex data. Also called Flash cookie.
locally shared object (LSO)
An attack that intercepts legitimate communication and forges a
fictitious response to the sender.
A cookie that is recorded on the hard drive of the computer and does
not expire when the browser closes.
A utility that sends an ICMP echo request message to a host.
An attack that uses the Internet Control Message Protocol (ICMP) to flood a
victim with packets.
A third-party library that attaches to a web browser and can be embedded inside a
An attack that exploits a vulnerability in software to gain access to
resources that the user normally would be restricted from accessing.
An attack that makes a copy of the transmission before sending it to the recipient.
A cookie that is stored in Random Access Memory (RAM), instead of on
the hard drive, and only lasts only for the duration of a visit to a website.
An attack in which an attacker attempts to impersonate the user by
using the user's session token.
A form of verification used when accessing a secure web application.
An attack that broadcasts a ping request to computers yet changes the
address so that all responses are sent to the victim.
Impersonating another computer or device.
An attack that targets SQL servers by injecting commands to be manipulated
by the database.
An attack that takes advantage of the procedures for initiating a TCP/IP
SYN flood attack
A cookie that was created by a third party that is different from the
An attack that exploits the trust relationship between three parties.
A markup language that is designed to carry data, in
contrast to HTML, which indicates how to display data.
XML (Extensible Markup Language)
An attack that injects XML tags and data into a database.
Attack that exploits previously unknown vulnerabilities, so victims have
no time (zero days) to prepare for or defend against the attack.
YOU MIGHT ALSO LIKE...
Ch 3 Application and Networking Based Attacks
Chapter 3 Computer Security
Security+ Chapter 3
Security + | Chapter 3 Terms (Application and Netw…