DDOS - distributed denial of service, attack overwhelms a server, network, or service with a massive volume of traffic from multiple sources (e.g., infected devices in a botnet). The goal is to make the targeted system unavailable to legitimate users by exhausting its resources., DOS - attack is similar to DDoS but originates from a single source. It disrupts the normal functioning of a server or network by flooding it with malicious traffic or exploiting a vulnerability., Zero day attack - attack exploits a vulnerability that is unknown to the software vendor or security community. Because no patch or fix is available, these attacks can be especially dangerous., Spoofing - refers to impersonating a trusted entity to deceive systems or individuals. It can occur in various contexts, such as: IP spoofing, email spoofing, caller ID spoofing, On path attack - occurs when a third party intercepts communication between two parties without their knowledge. The attacker can eavesdrop, alter data, or impersonate one of the parties, DNS spoofing, packet sniffing, Brute force attack - trial-and-error method used by attackers to guess passwords, encryption keys, or login credentials. They systematically try every possible combination until the correct one is found. Tools like automated bots are often used for this. Strong passwords and account lockout mechanisms can help mitigate brute force attacks., Dictionary attack - cyberattack method used to guess passwords or decryption keys. attacker systematically tries a list of common passwords or precompiled words (like those in a dictionary) to gain unauthorized access to a system or account., Insider threat - occurs when someone within an organization misuses their access to harm the organization., SQL injection - type of web application attack where an attacker injects malicious SQL statements into input fields to manipulate the database. Steal sensitive data, XSS - cross site scripting, vulnerability that allows attackers to inject malicious scripts into web pages viewed by others. The malicious script is stored on the server and delivered to users. Stealing cookies,
0%
Threats
Compartir
Compartir
Compartir
per en/la
Gprimal
Core 2 1102
CompTIA A plus
Editar continguts
Imprimir
Incrustar
Més
Assignacions
Tauler de classificació
Mostrar-ne més
Mostrar-ne menys
Aquesta taula de classificació és privada actualment. Fés clic a
Compartir
per fer-la públic.
El propietari del recurs ha inhabilitat aquesta taula de classificació.
Aquesta taula de classificació està inhabilitada perquè que les teves opcions són diferents a les del propietari del recurs.
Reverteix les opcions
Emparellar
és una plantilla de final obert. No genera puntuacions per a una taula de classificació.
Cal iniciar la sessió
Estil visual
Tipus de lletra
Subscripció obligatòria
Opcions
Canvia de fonament
Mostrar-ho tot
Apareixeran més formats a mesura que jugueu a l'activitat.
Resultats oberts
Copiar enllaç
Codi QR
Suprimir
Restaurar desada automàtica:
?