DDOS - distributed denial of service, attack overwhelms a server, network, or service with a massive volume of traffic from multiple sources (e.g., infected devices in a botnet). The goal is to make the targeted system unavailable to legitimate users by exhausting its resources., DOS - attack is similar to DDoS but originates from a single source. It disrupts the normal functioning of a server or network by flooding it with malicious traffic or exploiting a vulnerability., Zero day attack - attack exploits a vulnerability that is unknown to the software vendor or security community. Because no patch or fix is available, these attacks can be especially dangerous., Spoofing - refers to impersonating a trusted entity to deceive systems or individuals. It can occur in various contexts, such as: IP spoofing, email spoofing, caller ID spoofing, On path attack - occurs when a third party intercepts communication between two parties without their knowledge. The attacker can eavesdrop, alter data, or impersonate one of the parties, DNS spoofing, packet sniffing, Brute force attack - trial-and-error method used by attackers to guess passwords, encryption keys, or login credentials. They systematically try every possible combination until the correct one is found. Tools like automated bots are often used for this. Strong passwords and account lockout mechanisms can help mitigate brute force attacks., Dictionary attack - cyberattack method used to guess passwords or decryption keys. attacker systematically tries a list of common passwords or precompiled words (like those in a dictionary) to gain unauthorized access to a system or account., Insider threat - occurs when someone within an organization misuses their access to harm the organization., SQL injection - type of web application attack where an attacker injects malicious SQL statements into input fields to manipulate the database. Steal sensitive data, XSS - cross site scripting, vulnerability that allows attackers to inject malicious scripts into web pages viewed by others. The malicious script is stored on the server and delivered to users. Stealing cookies,
0%
Threats
共享
共享
共享
由
Gprimal
College
Core 2 1102
CompTIA A plus
编辑内容
打印
嵌入
更多
作业
排行榜
显示更多
显示更少
此排行榜当前是私人享有。单击
,共享
使其公开。
资源所有者已禁用此排行榜。
此排行榜被禁用,因为您的选择与资源所有者不同。
还原选项
匹配游戏
是一个开放式模板。它不会为排行榜生成分数。
需要登录
视觉风格
字体
需要订阅
选项
切换模板
显示所有
播放活动时将显示更多格式。
打开成绩
复制链接
QR 代码
删除
恢复自动保存:
?