Protocols
OSI Model
IP Addresses
Social Engineering
Malware
100

Uses TCP port 143. Is used to receive mail 

IMAP Internet message access protocol 

100

Layer of OSI where routing occurs

Network (Layer 3)

100
IPv4 Loopback address

127.0.0.1

100

The attempt to fraudulently obtain information from people via email.

Phishing

100

Malware that runs without the user’s knowledge; needs help to spread

Virus

200

Uses TCP port 445. It allows you to connect to shared folder on another computer (Microsoft)

SMB (Server Message Block)

200

Layer of OSI model where encryption and compression occurs

Presentation (Layer 6)

200

Translates private IP to public IP address

NAT (Network Address Translation)

200

Going though garbage or a desk looking for personally identifiable information (PII) 

Dumpster diving

200

Appears to perform desired functions but is actually performing malicious actions behind the scene.

Trojan Horse

300

Uses UDP ports 67 and 68

DHCP (Dynamic Host Configuration Protocol

300

Layer of OSI model in which frames are the PDU (Protocol Data Unit)

Data link (layer 2)

300

Type of address you get when you can't contact DHCP server

APIPA 169.254.X.X

300

The attempt of a person to “tag” along with an authorized person to gain entry into a restricted area.

Piggybacking/tailgating

300

Software designed to gain administrator level control over a computer system without being detected

Spyware

400

Uses UDP port to copy router and switch configs to and from a computer for administration

TFTP  (Trivial File Transfer Protocol)

400

What layer of OSI Model and TCP/IP have same name

Transport Layer

400

Subnet Mask 255.255.255.0 in CIDR notation

/24

400

The attempt to fraudulently obtain private information from executives, like the CEO

Whaling

400

Similar to a virus except that it self-replicates, whereas a virus does not.

Worm

500

Uses TCP port 389. Used to browse directories such as Active Directory

LDAP (Lightweight Directory Access Protocol)

500

Layer of OSI model where cabling occurs

Physical (Layer 1)

500

IPv6 loopback address

::1

500

The attempt of a person to use direct observation to find out a user’s password, PIN, or other authentication methods

Shoulder surfing

500

The abuse of electronic messaging systems such as email, broadcast media, and instant messaging.

Spam/Adware