100%(5)5 out of 5 people found this document helpful
This preview shows page 64 - 66 out of 192 pages.
DNS spoofing: A computer hacking attack, whereby data is introduced into a Domain Name System (DNS) resolver’s cache, causing the name server to return an incorrect IP address, diverting traffic to the attacker’s computer (or any other computer). Also called DNS cache poisoning.domain: A set of subjects, their information objects, and a common security policy. SOURCE: SP 800-27 An environment or context that includes a set of system resources and a set of system entities that have the right to access the resources as defined by a common security policy, security model, or security architecture. See Security Domain. SOURCE: CNSSI-4009; SP 800-53; SP 800-37domain controller: A Microsoft Windows server that has Active Directory Domain Services installed which manages domain information, such as login identification and passwords.domain hijacking attack: A cyber-attack that takes over a domain by first blocking access to the domain’s DNS server and then putting the hacker’s server in its place.doorknob-rattling attack: A hacker attempts a very few common username and password combinations on several computers resulting in very few failed login attempts. This attack can go undetected unless the data related to login failures from all the hosts are collected and aggregated to check for doorknob-rattling from any remote destination.doorway page: Web pages that are created for spamdexing. This is for spamming the index of a search engine by inserting results for particular phrases with the purpose of sending visitors to a different page. They are also known as bridge pages, portal pages, jump pages, gateway pages, entry pages, and other names. Doorway pages that redirect visitors without their knowledge use some form of cloaking.Dorkbot: Dorkbot is a botnet used to steal online payment, participate in distributed denial-of-service (DDoS) attacks, and deliver other types of malware to victims’ computers. Dorkbot is commonly spread via malicious links sent through social networks instant message programs or through infected USB devices. Dorkbot’s backdoor functionality allows a remote attacker to exploit infected systems. A system infected with Dorkbot may be used to send spam, participate in DDoS attacks, or harvest users’ credentials for online services, including banking services.doxing: Publicly releasing a person’s identifying information including full name, date of birth, address, and pictures typically retrieved from social networking site profiles. SOURCE: FBI Internet Social Networking Risksdraining: A form of urban exploration (urbex) when exploring drains. Also commonly referred to as infiltration, urban spelunking, urban rock climbing, urban caving, or building hacking. Sewers are the most dangerous locations to explore due to risk of poisoning by toxic gas such as methane and hydrogen sulfide.
CHAPTER 5 ■D59drift eliminator: Cooling towers use drift eliminators to minimize drift mass airflow and prevent escape of entrained water droplets that might contain Legionella bacteria. A plenum is used to maintain airflow within