Key Terms

Review the following list of key terms:

  • Back door A hidden pathway for gaining entry to a computer system.

  • Buffer overflow An attack method that lets the attacker deliver malicious commands to a system by overrunning an application buffer.

  • Denial-of-service attack (DOS) An attack design to cripple the victim’s system by consuming system resources.

  • Email worm— A malicious script or program transmitted through an email message.

  • Phishing Using a fake link, message, or web page to entice the user into initiating a connection with a fraudulent website.

  • Root access The highest level of access to a computer system. Root access offers nearly unlimited control of the system.

  • Rootkit A set of tools used by an intruder to expand and disguise his ...

Get Sams Teach Yourself TCP/IP in 24 Hours, Fourth Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.