DDOS - distributed denial of service, attack overwhelms a server, network, or service with a massive volume of traffic from multiple sources (e.g., infected devices in a botnet). The goal is to make the targeted system unavailable to legitimate users by exhausting its resources., DOS - attack is similar to DDoS but originates from a single source. It disrupts the normal functioning of a server or network by flooding it with malicious traffic or exploiting a vulnerability., Zero day attack - attack exploits a vulnerability that is unknown to the software vendor or security community. Because no patch or fix is available, these attacks can be especially dangerous., Spoofing - refers to impersonating a trusted entity to deceive systems or individuals. It can occur in various contexts, such as: IP spoofing, email spoofing, caller ID spoofing, On path attack - occurs when a third party intercepts communication between two parties without their knowledge. The attacker can eavesdrop, alter data, or impersonate one of the parties, DNS spoofing, packet sniffing, Brute force attack - trial-and-error method used by attackers to guess passwords, encryption keys, or login credentials. They systematically try every possible combination until the correct one is found. Tools like automated bots are often used for this. Strong passwords and account lockout mechanisms can help mitigate brute force attacks., Dictionary attack - cyberattack method used to guess passwords or decryption keys. attacker systematically tries a list of common passwords or precompiled words (like those in a dictionary) to gain unauthorized access to a system or account., Insider threat - occurs when someone within an organization misuses their access to harm the organization., SQL injection - type of web application attack where an attacker injects malicious SQL statements into input fields to manipulate the database. Steal sensitive data, XSS - cross site scripting, vulnerability that allows attackers to inject malicious scripts into web pages viewed by others. The malicious script is stored on the server and delivered to users. Stealing cookies,
0%
Threats
Share
Share
Share
by
Gprimal
College
Core 2 1102
CompTIA A plus
Edit Content
Print
Embed
More
Assignments
Leaderboard
Show more
Show less
This leaderboard is currently private. Click
Share
to make it public.
This leaderboard has been disabled by the resource owner.
This leaderboard is disabled as your options are different to the resource owner.
Revert Options
Match up
is an open-ended template. It does not generate scores for a leaderboard.
Log in required
Visual style
Fonts
Subscription required
Options
Switch template
Show all
More formats will appear as you play the activity.
Open results
Copy link
QR code
Delete
Continue editing:
?