Dictionary attack - A method of breaking a password by using a library of commonly used words or phrases to guess possible passwords, Brute Force attack - A password attack in which the attacker uses all possible combinations of characters until a password match is fouIt can take thousands of guesses before a password is cracked., SQL Injection - Where malicious code is injected into input fields of a web application’s database query., Buffer Overflow - Occurs when a program writes more data to a block of memory than it was allocated to hold, which can lead to the overwriting of adjacent memory areas, unpreditacble behavior, system crashes, or allowing attackers to execute malicious code., Spoofing - The deceptive practice of assuming a false identity or falsifying information to gain unauthorized access or deceive users and systems., MiTM - Involves an unauthorized third party intercepting and potentially altering communication between two parties without their knowledge., ARP Poisoning - Involves manipulating or corrupting the ARP cache on a local network. The attacker sends falsified messages, assocating their MAC address with the IP address of a legitimate network device., DoS attack - A malicious attempt to disrupt the normal functioning of a targeted system, service, or network by overwhelming it with a flood of illegitimate requests or traffic., Ping of Death - Exploits vulnerabilities in the Internet Control Message Protocol (ICMP) by sending malformed or oversized packets to a target system., Ping Flood - Where an attacker sends a mass volume of ICMP echo requests to a target system, overwhelming it with traffic. The goal is to consume the target’s resources, such as network bandwidth or processing capacity., Smurf - The attacker sends a large volume of ICMP echo request packets to a network’s broadcast address using a spoofed source address, making it appear as if the requests are originating from the victim’s address., SSL attack - These protocols utilize cryptography to ensure the confidentiality and integrity of data being exchanged between clients and servers.. An attacker targets the specific protocols in several ways to disrupt the confidentiality and integrity and manipulate the data in question., Social Engineering - The manipulation of individuals to gain unauthorized access to sensitive information or systems. It involves exploiting human psychology rather than relying on technical vulnerabilities., Impersonation - Pretending to be someone else to gain trust and extract information., Phising attack - Sending deceptive emails, messages, or websites that appear to be from a trustworthy source to trick individuals into revealing sensitive information.,
0%
Common Attacks and Threats
Partager
par
Echo15
Higher Education
Cybersecurity
Modifier le contenu
Incorporer
Plus
Classement
Afficher plus
Afficher moins
Ce classement est actuellement privé. Cliquez sur
Partager
pour le rendre public.
Ce classement a été désactivé par le propriétaire de la ressource.
Ce classement est désactivé car vos options sont différentes pour le propriétaire de la ressource.
Rétablir les Options
Apparier
est un modèle à composition non limitée. Il ne génère pas de points pour un classement.
Connexion requise
Style visuel
Polices
Abonnement requis
Options
Changer de modèle
Afficher tout
D'autres formats apparaîtront au fur et à mesure que vous jouerez l'activité.
Ouvrir les résultats
Copier le lien
Code QR
Supprimer
Restauration auto-sauvegardé :
?