Uses TCP port 143. Is used to receive mail
IMAP Internet message access protocol
Layer of OSI where routing occurs
Network (Layer 3)
127.0.0.1
The attempt to fraudulently obtain information from people via email.
Phishing
Malware that runs without the user’s knowledge; needs help to spread
Virus
Uses TCP port 445. It allows you to connect to shared folder on another computer (Microsoft)
SMB (Server Message Block)
Layer of OSI model where encryption and compression occurs
Presentation (Layer 6)
Translates private IP to public IP address
NAT (Network Address Translation)
Going though garbage or a desk looking for personally identifiable information (PII)
Dumpster diving
Appears to perform desired functions but is actually performing malicious actions behind the scene.
Trojan Horse
Uses UDP ports 67 and 68
DHCP (Dynamic Host Configuration Protocol
Layer of OSI model in which frames are the PDU (Protocol Data Unit)
Data link (layer 2)
IPv6 loopback address
::1
When an unauthorized person attempts to “tag” along with an authorized person into a restricted area via stealth.
Tailgating
Software designed to stay hidden for as long as possible
Spyware
Uses UDP port to copy router and switch configs to and from a computer for administration
TFTP (Trivial File Transfer Protocol)
What layer of OSI Model and TCP/IP have same name
Transport Layer
Subnet Mask 255.255.255.0 in CIDR notation
/24
The attempt to fraudulently obtain private information from executives, like the CEO
Whaling
Self-replicating malware that can spread on its own
Worm
Uses TCP port 3389 for Remote Windows access
Remote Desktop Protocol
Layer of OSI model where cabling occurs
Physical (Layer 1)
Type of address you generate when you can't contact a DHCP server
APIPA 169.254.X.X
The attempt of a person to use direct observation to find out a user’s password, PIN, or other authentication methods
Shoulder surfing
The non-malicious abuse of electronic messaging systems such as email, broadcast media, and instant messaging.
Spam/Adware