Changes

Jump to navigation Jump to search
Line 241: Line 241:  
====DNS Abuse ====
 
====DNS Abuse ====
 
* [[Botnet Attacks]] – infecting Internet-connected computers with malware and commanding them to perform activities under the control of a remote administrator.
 
* [[Botnet Attacks]] – infecting Internet-connected computers with malware and commanding them to perform activities under the control of a remote administrator.
 +
* [[cache poisoning]] – causing a DNS resolver to respond with a false IP address bearing malicious code.
 
* [[Cybersquatting]] – attempting to profit by purchasing domain names made of marketable and trademark-related terms and later reselling or licensing those names back to the companies that developed the trademark
 
* [[Cybersquatting]] – attempting to profit by purchasing domain names made of marketable and trademark-related terms and later reselling or licensing those names back to the companies that developed the trademark
 
* [[DDoS Attack]] – flooding a victim site with incoming traffic that originates from many different sources, making it impossible to access the site or stop the attack by blocking a single source.
 
* [[DDoS Attack]] – flooding a victim site with incoming traffic that originates from many different sources, making it impossible to access the site or stop the attack by blocking a single source.
 
* [[DNS hijacking]] – redirecting victims to the attacker’s site instead of the one initially requested.  
 
* [[DNS hijacking]] – redirecting victims to the attacker’s site instead of the one initially requested.  
 
* [[Domain Kiting]] – returning a name just before the five-day period expires and re-registering it again as soon as it becomes available.
 
* [[Domain Kiting]] – returning a name just before the five-day period expires and re-registering it again as soon as it becomes available.
* [[DNS poisoning]] – causing a DNS resolver to respond with a false IP address bearing malicious code.
   
* [[Malware]] – installing malicious software, such as viruses, spyware, or ransomware, on a device without the user’s consent, to disrupt the device’s operations, gather sensitive information, or access private computer systems.
 
* [[Malware]] – installing malicious software, such as viruses, spyware, or ransomware, on a device without the user’s consent, to disrupt the device’s operations, gather sensitive information, or access private computer systems.
 
* [[Pharming]] – redirecting unknowing users to fraudulent sites or services through DNS hijacking or poisoning.  
 
* [[Pharming]] – redirecting unknowing users to fraudulent sites or services through DNS hijacking or poisoning.  
 
* [[Phishing]] – the acquisition of personal and financial information through deceptive means such as fraudulent emails, copies of legitimate websites, brand spoofing, and carding.
 
* [[Phishing]] – the acquisition of personal and financial information through deceptive means such as fraudulent emails, copies of legitimate websites, brand spoofing, and carding.
 
* [[Typosquatting]] – the intentional registration of misspellings of popular website addresses to garner traffic; aka URL hijacking.
 
* [[Typosquatting]] – the intentional registration of misspellings of popular website addresses to garner traffic; aka URL hijacking.
 +
 
==Standards==
 
==Standards==
 
* [[ASCII]] – A common character-encoding standard that computers use to store, transmit, and print texts using English/Latin.
 
* [[ASCII]] – A common character-encoding standard that computers use to store, transmit, and print texts using English/Latin.
Bureaucrats, Check users, lookupuser, Administrators, translator
14,952

edits

Navigation menu