A utility that sends an ICMP echo request message
ActiveX
·
A set of rules for how
applications under the Microsoft Windows operating system should share
information.
ActiveX control
·
A specific way of
implementing ActiveX that runs through the web browser and functions like a
miniature application.
add-on
·
Program that provides
additional functionality to web browsers. Also called extension.
Address Resolution
Protocol (ARP)
·
Part of the TCP/IP
protocol for determining the MAC address based on the IP address.
arbitrary/remote code
execution
·
An attack that allows
an attacker to run programs and execute commands on a different computer.
ARP poisoning
·
An attack that
corrupts the ARP cache.
Attachment
·
A file that is coupled
to an email message and often carries malware.
buffer overflow attack
·
An attack that occurs
when a process attempts to store data in RAM beyond the boundaries of a
fixed-length storage buffer.
client-side attack
·
An attack that targets
vulnerabilities in client applications that interact with a compromised server
or process malicious data.
command injection
·
Injecting and
executing commands to execute on a server.
Cookie
·
A file on a local
computer in which a web server stores user-specific information.
cross-site scripting
(XSS)
·
An attack that injects
scripts into a web application server to direct attacks at clients.
denial of service
(DoS)
·
An attack that
attempts to prevent a system from performing its normal functions by
overwhelming the system with requests.
directory traversal
·
An attack that takes
advantage of a vulnerability so that a user can move from the root directory to
restricted directories.
DNS poisoning
·
An attack that
substitutes DNS addresses so that the computer is automatically redirected to
an attacker's device.
Domain Name System
(DNS)
·
A hierarchical name
system for translating domain names to IP addresses.
Extension
·
Another name for
add-on.
first-party cookie
·
A cookie that is
created from the website currently being viewed.
Flash cookie
·
Another name for
locally shared object (LSO).
host table
·
A list of the mappings
of host names to IP addresses.
HTTP header
·
Part of HTTP that is
comprised of fields that contain the different characteristics of the data that
is being transmitted.
HTTP header
manipulation
·
Modifying HTTP headers
to create an attack.
integer overflow
attack
·
An attack that is the
result of an attacker changing the value of a variable to something outside the
range that the programmer had intended.
locally shared object
(LSO)
·
A cookie that is
significantly different in size and location from regular cookies, and can
store more complex data. Also called Flash cookie.
man-in-the-middle
·
An attack that
intercepts legitimate communication and forges a fictitious response to the
sender.
persistent cookie
·
A cookie that is
recorded on the hard drive of the computer and does not expire when the browser
closes.
Ping
·
A utility that sends
an ICMP echo request message to a host.
ping flood
·
An attack that uses
the Internet Control Message Protocol (ICMP) to flood a victim with packets.