A method of masquerading in which an attacker forges the IP addresses on the data packets he sends so they look as if they came from inside a network on which systems trust each other. Because the attacker's system looks like an inside system, he is never asked for a password or any other type of authentication.
Kavungya answered the question on May 17, 2019 at 09:24
-
Describe Password Sniffing.
(Solved)
Describe Password Sniffing.
Date posted:
May 17, 2019
.
Answers (1)
-
Define Rootkits.
(Solved)
Define Rootkits.
Date posted:
May 17, 2019
.
Answers (1)
-
Define Keyloggers.
(Solved)
Define Keyloggers.
Date posted:
May 17, 2019
.
Answers (1)
-
Excess Privileges.
(Solved)
Excess Privileges.
Date posted:
May 17, 2019
.
Answers (1)
-
Define a Zero Day Attack.
(Solved)
Define a Zero Day Attack.
Date posted:
May 17, 2019
.
Answers (1)
-
Describe social engineering.
(Solved)
Describe social engineering.
Date posted:
May 17, 2019
.
Answers (1)
-
What is Pharming?
(Solved)
What is Pharming?
Date posted:
May 17, 2019
.
Answers (1)
-
What is Phishing?
(Solved)
What is Phishing?
Date posted:
May 17, 2019
.
Answers (1)
-
Define electronic spamming.
(Solved)
Define electronic spamming.
Date posted:
May 17, 2019
.
Answers (1)
-
Describe the ways of detecting scanning attacks.
(Solved)
Describe the ways of detecting scanning attacks.
Date posted:
May 17, 2019
.
Answers (1)
-
Describe the ways of detecting Excess Privileges.
(Solved)
Describe the ways of detecting Excess Privileges.
Date posted:
May 17, 2019
.
Answers (1)
-
Describe the ways of detecting Data Diddling.
(Solved)
Describe the ways of detecting Data Diddling.
Date posted:
May 17, 2019
.
Answers (1)
-
Describe the ways of detecting Trojan Horses, Viruses, Worms, Salamis, and Logic Bombs.
(Solved)
Describe the ways of detecting Trojan Horses, Viruses, Worms, Salamis, and Logic Bombs.
Date posted:
May 17, 2019
.
Answers (1)
-
Describe the ways of detecting Timing Attacks.
(Solved)
Describe the ways of detecting Timing Attacks.
Date posted:
May 17, 2019
.
Answers (1)
-
Describe the ways of detecting Trap Doors.
(Solved)
Describe the ways of detecting Trap Doors.
Date posted:
May 17, 2019
.
Answers (1)
-
Describe the ways of detecting Software Piracy.
(Solved)
Describe the ways of detecting Software Piracy.
Date posted:
May 17, 2019
.
Answers (1)
-
Describe the ways of detecting Masquerading.
(Solved)
Describe the ways of detecting Masquerading.
Date posted:
May 17, 2019
.
Answers (1)
-
Describe the ways of detecting Wiretapping and Eavesdropping.
(Solved)
Describe the ways of detecting Wiretapping and Eavesdropping.
Date posted:
May 17, 2019
.
Answers (1)
-
Describe Dumpster Diving.
(Solved)
Describe Dumpster Diving.
Date posted:
May 17, 2019
.
Answers (1)
-
Explain the measures to fight unethical use of ICT.
(Solved)
Explain the measures to fight unethical use of ICT.
Date posted:
May 17, 2019
.
Answers (1)