User:Emperorneo/Books/Information Security Attacks

Identifying and Understanding Atacks and how to Mitigation Them

 * Spoofing attack
 * IP address spoofing
 * ARP spoofing
 * Man-in-the-middle attack
 * Referer spoofing
 * Caller ID spoofing
 * Email spoofing
 * MAC spoofing
 * Phishing
 * IDN homograph attack
 * Protocol spoofing
 * Stream cipher attack
 * Website spoofing


 * Computer Attacks
 * Attack (computing)
 * Telephone tapping
 * Port scanner
 * Idle scan
 * Denial-of-service attack
 * Ping flood
 * Ping of death
 * Smurf attack
 * Buffer overflow
 * Heap overflow
 * Stack overflow
 * Uncontrolled format string
 * Exploit (computer security)
 * Computer security
 * Backdoor (computing)
 * Tampering (crime)
 * Privilege escalation
 * Clickjacking
 * Computer virus
 * Botnet
 * Comparison of computer viruses
 * Keystroke logging
 * Malware
 * Multipartite virus
 * Trojan horse (computing)
 * Exploit kit