Really quick answer, with short descriptions.
Man-in-the-Middle:
A tries to communicate with B, C intercepts A, reads, forwards to B.
IP Spoofing:
Yes, my address is 192.168.1.250! Can I access your server now?
Password Stealing:
A leaves password on post-it note under keyboard. B looks under keyboard and all kinds of fun ensues. (Also: "brute force" -- try every password in a dictionary).
DNS Stealing:
Yes, I am the rightful owner of sex.com! Redirects all traffic to me!
Credentials (private keys) stealing:
A is careless and leaves unprotected
Social Engineering:
"Hi, this is A of the IT Dept., we are changing a few things in the software management to improve the Windows updates. Would you mind telling me your password, so your machine can be updated faster?"
Phishing:
This email is from Yahoo! Answers, please click on the following link to gain 1,000 extra points and a free prize!
Biometry stealing:
Company A uses fingerprint readers to allow person B to access secure facilities. Hacker C obtains B's fingerprints and all manner of fun ensues.
Etc... Etc... Etc... Read the book below for the ultimate list.
2006-12-25 21:27:22
·
answer #2
·
answered by noryungi 1
·
0⤊
0⤋
malware,spyware,adware,rat,trojan,....
many more re there
2006-12-25 21:20:14
·
answer #4
·
answered by sweetraskels 4
·
0⤊
0⤋