Uses TCP port 143. Is used to receive mail
IMAP Internet message access protocol
Layer of OSI where routing occurs
Network (Layer 3)
127.0.0.1
The attempt to fraudulently obtain information from people via email.
Phishing
Malware that runs without the user’s knowledge; needs help to spread
Virus
Uses TCP port 445. It allows you to connect to shared folder on another computer (Microsoft)
SMB (Server Message Block)
Layer of OSI model where encryption and compression occurs
Presentation (Layer 6)
Translates private IP to public IP address
NAT (Network Address Translation)
Going though garbage or a desk looking for personally identifiable information (PII)
Dumpster diving
Appears to perform desired functions but is actually performing malicious actions behind the scene.
Trojan Horse
Uses UDP ports 67 and 68
DHCP (Dynamic Host Configuration Protocol
Layer of OSI model in which frames are the PDU (Protocol Data Unit)
Data link (layer 2)
Type of address you get when you can't contact DHCP server
APIPA 169.254.X.X
The attempt of a person to “tag” along with an authorized person to gain entry into a restricted area.
Piggybacking/tailgating
Software designed to gain administrator level control over a computer system without being detected
Spyware
Uses UDP port to copy router and switch configs to and from a computer for administration
TFTP (Trivial File Transfer Protocol)
What layer of OSI Model and TCP/IP have same name
Transport Layer
Subnet Mask 255.255.255.0 in CIDR notation
/24
The attempt to fraudulently obtain private information from executives, like the CEO
Whaling
Similar to a virus except that it self-replicates, whereas a virus does not.
Worm
Uses TCP port 389. Used to browse directories such as Active Directory
LDAP (Lightweight Directory Access Protocol)
Layer of OSI model where cabling occurs
Physical (Layer 1)
IPv6 loopback address
::1
The attempt of a person to use direct observation to find out a user’s password, PIN, or other authentication methods
Shoulder surfing
The abuse of electronic messaging systems such as email, broadcast media, and instant messaging.
Spam/Adware