Line 241: |
Line 241: |
| ====DNS Abuse ==== | | ====DNS Abuse ==== |
| * [[Botnet Attacks]] – infecting Internet-connected computers with malware and commanding them to perform activities under the control of a remote administrator. | | * [[Botnet Attacks]] – infecting Internet-connected computers with malware and commanding them to perform activities under the control of a remote administrator. |
| + | * [[cache poisoning]] – causing a DNS resolver to respond with a false IP address bearing malicious code. |
| * [[Cybersquatting]] – attempting to profit by purchasing domain names made of marketable and trademark-related terms and later reselling or licensing those names back to the companies that developed the trademark | | * [[Cybersquatting]] – attempting to profit by purchasing domain names made of marketable and trademark-related terms and later reselling or licensing those names back to the companies that developed the trademark |
| * [[DDoS Attack]] – flooding a victim site with incoming traffic that originates from many different sources, making it impossible to access the site or stop the attack by blocking a single source. | | * [[DDoS Attack]] – flooding a victim site with incoming traffic that originates from many different sources, making it impossible to access the site or stop the attack by blocking a single source. |
| * [[DNS hijacking]] – redirecting victims to the attacker’s site instead of the one initially requested. | | * [[DNS hijacking]] – redirecting victims to the attacker’s site instead of the one initially requested. |
| * [[Domain Kiting]] – returning a name just before the five-day period expires and re-registering it again as soon as it becomes available. | | * [[Domain Kiting]] – returning a name just before the five-day period expires and re-registering it again as soon as it becomes available. |
− | * [[DNS poisoning]] – causing a DNS resolver to respond with a false IP address bearing malicious code.
| |
| * [[Malware]] – installing malicious software, such as viruses, spyware, or ransomware, on a device without the user’s consent, to disrupt the device’s operations, gather sensitive information, or access private computer systems. | | * [[Malware]] – installing malicious software, such as viruses, spyware, or ransomware, on a device without the user’s consent, to disrupt the device’s operations, gather sensitive information, or access private computer systems. |
| * [[Pharming]] – redirecting unknowing users to fraudulent sites or services through DNS hijacking or poisoning. | | * [[Pharming]] – redirecting unknowing users to fraudulent sites or services through DNS hijacking or poisoning. |
| * [[Phishing]] – the acquisition of personal and financial information through deceptive means such as fraudulent emails, copies of legitimate websites, brand spoofing, and carding. | | * [[Phishing]] – the acquisition of personal and financial information through deceptive means such as fraudulent emails, copies of legitimate websites, brand spoofing, and carding. |
| * [[Typosquatting]] – the intentional registration of misspellings of popular website addresses to garner traffic; aka URL hijacking. | | * [[Typosquatting]] – the intentional registration of misspellings of popular website addresses to garner traffic; aka URL hijacking. |
| + | |
| ==Standards== | | ==Standards== |
| * [[ASCII]] – A common character-encoding standard that computers use to store, transmit, and print texts using English/Latin. | | * [[ASCII]] – A common character-encoding standard that computers use to store, transmit, and print texts using English/Latin. |