Key Terms
Review the following list of key terms:
back door— A hidden pathway for gaining entry to a computer system.
buffer overflow— An attack method that lets the attacker deliver malicious commands to a system by overrunning an application buffer.
denial-of-service attack— An attack design to cripple the victim's system by consuming system resources.
email worm— A malicious script or program transmitted through an email message.
hacker— A user who trespasses on computer systems for fun or profit. To some, a hacker is any high-end user who is obsessed with and devoted to working with computers.
root access— The highest level of access to a computer system. Root access offers nearly unlimited control of the system.
root kit— A set of tools ...
Get Sams Teach Yourself TCP/IP in 24 Hours, Third Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.