DDOS - distributed denial of service, attack overwhelms a server, network, or service with a massive volume of traffic from multiple sources (e.g., infected devices in a botnet). The goal is to make the targeted system unavailable to legitimate users by exhausting its resources., DOS - attack is similar to DDoS but originates from a single source. It disrupts the normal functioning of a server or network by flooding it with malicious traffic or exploiting a vulnerability., Zero day attack - attack exploits a vulnerability that is unknown to the software vendor or security community. Because no patch or fix is available, these attacks can be especially dangerous., Spoofing - refers to impersonating a trusted entity to deceive systems or individuals. It can occur in various contexts, such as: IP spoofing, email spoofing, caller ID spoofing, On path attack - occurs when a third party intercepts communication between two parties without their knowledge. The attacker can eavesdrop, alter data, or impersonate one of the parties, DNS spoofing, packet sniffing, Brute force attack - trial-and-error method used by attackers to guess passwords, encryption keys, or login credentials. They systematically try every possible combination until the correct one is found. Tools like automated bots are often used for this. Strong passwords and account lockout mechanisms can help mitigate brute force attacks., Dictionary attack - cyberattack method used to guess passwords or decryption keys. attacker systematically tries a list of common passwords or precompiled words (like those in a dictionary) to gain unauthorized access to a system or account., Insider threat - occurs when someone within an organization misuses their access to harm the organization., SQL injection - type of web application attack where an attacker injects malicious SQL statements into input fields to manipulate the database. Steal sensitive data, XSS - cross site scripting, vulnerability that allows attackers to inject malicious scripts into web pages viewed by others. The malicious script is stored on the server and delivered to users. Stealing cookies,
0%
Threats
Podeli
Podeli
Podeli
autor
Gprimal
College
Core 2 1102
CompTIA A plus
Uredi sadržaj
Odštampaj
Ugradi
Više
Zadatke
Tabela
Prikaži više
Prikaži manje
Ova tabela je trenutno privatna. Kliknite na
Podeli
da biste je objavili.
Pristup tabeli je onemogućio vlasnik sredstva.
Ova tabela je onemogućena pošto Vam se podešavanja razlikuju od podešavanja vlasnika sredstva.
Vrati podešavanja
Spoji
je otvoreni šablon. On ne generiše rezultate za tabelu rangiranja.
Prijava je obavezna
Vizuelni stil
Fontove
Potrebna je pretplata
Postavke
Promeni šablon
Prikaži sve
Više formata će se pojaviti tokom igranja aktivnosti.
Otvoreni rezultati
Kopiraj vezu
QR kôd
Izbriši
Vrati automatski sačuvano:
?