A technique used to exploit vulnerabilities by overwriting a buffer's boundary and writing into adjacent memory.
<<Buffer overflow attacks>>
Software designed to disrupt, damage, or gain unauthorised access to a computer system.
<<Malware>>
actions have the same name but different parameter lists and processes
What is polymorphism?
The stack operation that removes the top element.
What is pop()?
This term describes a data model defined by its operations rather than its implementation.
What is an Abstract Data Type?
A technique where attackers inject malicious scripts into trusted websites, which then run on a user's browser
<<Cross-site scripting (X-SS)>>
The process of using tools to identify network topologies, including servers, firewalls, and other devices.
<<Network mapping>>
increased complexity for small problems; unsuited to particular classes of problem
What are problems with OOP approaches?
A queue implementation where the last node links back to the first.
What is a circular queue
The queue operation that adds an element to the back.
What is enqueue()?
The process of creating custom scripts or tools designed to take advantage of specific vulnerabilities in a system.
<<Exploit development>>
The use of tools to discover active devices on a network.
Network Scanning
speed to completion information hiding to reduce module dependencies expertise in narrow fields
What are advantages to working in programming teams
This traversal visits the left subtree, then the node, then the right subtree.
what is an inorder traversal?
This ADT follows the LIFO principle.
what is a stack
An individual who attempts to gain unauthorized access to a computer system.
<<Hacker>>
The arrangement of the various elements (links, nodes, etc.) of a computer network.
<<Network topology>>
The process of determining the operating system running on a network device.
<<OS detection>>
Uses nodes and pointers
what is an dynamic data structure?
An ADT that follows FIFO ordering is called this.
What is a queue?
A unique numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication
<<IP address>>
Data collected from publicly available sources, such as social media and official records, and then analyzed
<<Open-source intelligence (OSINT)>>
A tool used in attempts to discover passwords, often by trying many possibilities.
<<Password cracking tool>>
Data and actions are limited to the object they are in
What is encapsulation?
This type of ADT stores data in a hierarchical manner, often used in parsing expressions.
What is a tree