CS458 Study Guide - Final Guide: Unique Key, Hard Disk Drive, Sorting Algorithm

331 views21 pages

Document Summary

Mediation application ensures that what the user has entered constitutes a meaningful request. Incomplete mediation occurs when application accepts incorrect data from user. Client side mediation can be turned off or tricked. Malware software written with malicious intent. Virus is a malware that infects other files. Trojan horses are programs which claim to do something innocuous (and usually do), but which also hide malicious behavior. A worm is a piece of code that can replicate with little or no user environment. Web bugs can send ip addresses, contents of cookies, and any personal info the site has about you. Back door set of instructions designed to bypass the normal authentication mechanism. charge, etc. A salami attack is made of many small attacks e. g. gas pumps misreport, credit cards. A root kit is tool that can be used to gain unauthorized root/administrator privileges and to hide its existence by changing log file, modifying ls and ps commands, modifying the kernel, etc.