Dictionary attack - A method of breaking a password by using a library of commonly used words or phrases to guess possible passwords, Brute Force attack - A password attack in which the attacker uses all possible combinations of characters until a password match is fouIt can take thousands of guesses before a password is cracked., SQL Injection - Where malicious code is injected into input fields of a web application’s database query., Buffer Overflow - Occurs when a program writes more data to a block of memory than it was allocated to hold, which can lead to the overwriting of adjacent memory areas, unpreditacble behavior, system crashes, or allowing attackers to execute malicious code., Spoofing - The deceptive practice of assuming a false identity or falsifying information to gain unauthorized access or deceive users and systems., MiTM - Involves an unauthorized third party intercepting and potentially altering communication between two parties without their knowledge., ARP Poisoning - Involves manipulating or corrupting the ARP cache on a local network. The attacker sends falsified messages, assocating their MAC address with the IP address of a legitimate network device., DoS attack - A malicious attempt to disrupt the normal functioning of a targeted system, service, or network by overwhelming it with a flood of illegitimate requests or traffic., Ping of Death - Exploits vulnerabilities in the Internet Control Message Protocol (ICMP) by sending malformed or oversized packets to a target system., Ping Flood - Where an attacker sends a mass volume of ICMP echo requests to a target system, overwhelming it with traffic. The goal is to consume the target’s resources, such as network bandwidth or processing capacity., Smurf - The attacker sends a large volume of ICMP echo request packets to a network’s broadcast address using a spoofed source address, making it appear as if the requests are originating from the victim’s address., SSL attack - These protocols utilize cryptography to ensure the confidentiality and integrity of data being exchanged between clients and servers.. An attacker targets the specific protocols in several ways to disrupt the confidentiality and integrity and manipulate the data in question., Social Engineering - The manipulation of individuals to gain unauthorized access to sensitive information or systems. It involves exploiting human psychology rather than relying on technical vulnerabilities., Impersonation - Pretending to be someone else to gain trust and extract information., Phising attack - Sending deceptive emails, messages, or websites that appear to be from a trustworthy source to trick individuals into revealing sensitive information.,
0%
Common Attacks and Threats
Дял
от
Echo15
Higher Education
Cybersecurity
Редактиране на съдържание
За вграждане
Повече
Табло
Покажи още
Покажи по-малко
Това табло е в момента частна. Щракнете върху
дял
да я направи публична.
Тази класация е забранено от собственика на ресурса.
Тази класация е забранено, като опциите са различни за собственика на ресурса.
Обръщам опции
Мач
е отворен шаблон. Тя не генерира резултати за табло.
Влезте в изисква
Визуален стил
Шрифтове
Изисква се абонамент
Опции
Шаблон за превключване
Покажи всички
Повече формати ще се появи, докато играете дейността.
Отворени резултати
Копиране на връзка
QR код
Изтриване
Възстановяване на авто-записаната:
?