Protocols
OSI Model
IP Addresses
Social Engineering
Malware
100

Uses TCP port 143. Is used to receive mail 

IMAP Internet message access protocol 

100

Layer of OSI where routing occurs

Network (Layer 3)

100
IPv4 Loopback address

127.0.0.1

100

The attempt to fraudulently obtain information from people via email.

Phishing

100

Malware that runs without the user’s knowledge; needs help to spread

Virus

200

Uses TCP port 445. It allows you to connect to shared folder on another computer (Microsoft)

SMB (Server Message Block)

200

Layer of OSI model where encryption and compression occurs

Presentation (Layer 6)

200

Translates private IP to public IP address

NAT (Network Address Translation)

200

Going though garbage or a desk looking for personally identifiable information (PII) 

Dumpster diving

200

Appears to perform desired functions but is actually performing malicious actions behind the scene.

Trojan Horse

300

Uses UDP ports 67 and 68

DHCP (Dynamic Host Configuration Protocol

300

Layer of OSI model in which frames are the PDU (Protocol Data Unit)

Data link (layer 2)

300

IPv6 loopback address

::1

300

When an unauthorized person attempts to “tag” along with an authorized person into a restricted area via stealth.

Tailgating

300

Software designed to stay hidden for as long as possible

Spyware

400

Uses UDP port to copy router and switch configs to and from a computer for administration

TFTP  (Trivial File Transfer Protocol)

400

What layer of OSI Model and TCP/IP have same name

Transport Layer

400

Subnet Mask 255.255.255.0 in CIDR notation

/24

400

The attempt to fraudulently obtain private information from executives, like the CEO

Whaling

400

Self-replicating malware that can spread on its own

Worm

500

Uses TCP port 3389 for Remote Windows access

Remote Desktop Protocol

500

Layer of OSI model where cabling occurs

Physical (Layer 1)

500

Type of address you generate when you can't contact a DHCP server

APIPA 169.254.X.X

500

The attempt of a person to use direct observation to find out a user’s password, PIN, or other authentication methods

Shoulder surfing

500

The non-malicious abuse of electronic messaging systems such as email, broadcast media, and instant messaging.

Spam/Adware

M
e
n
u