Dictionary attack - A method of breaking a password by using a library of commonly used words or phrases to guess possible passwords, Brute Force attack - A password attack in which the attacker uses all possible combinations of characters until a password match is fouIt can take thousands of guesses before a password is cracked., SQL Injection - Where malicious code is injected into input fields of a web application’s database query., Buffer Overflow - Occurs when a program writes more data to a block of memory than it was allocated to hold, which can lead to the overwriting of adjacent memory areas, unpreditacble behavior, system crashes, or allowing attackers to execute malicious code., Spoofing - The deceptive practice of assuming a false identity or falsifying information to gain unauthorized access or deceive users and systems., MiTM - Involves an unauthorized third party intercepting and potentially altering communication between two parties without their knowledge., ARP Poisoning - Involves manipulating or corrupting the ARP cache on a local network. The attacker sends falsified messages, assocating their MAC address with the IP address of a legitimate network device., DoS attack - A malicious attempt to disrupt the normal functioning of a targeted system, service, or network by overwhelming it with a flood of illegitimate requests or traffic., Ping of Death - Exploits vulnerabilities in the Internet Control Message Protocol (ICMP) by sending malformed or oversized packets to a target system., Ping Flood - Where an attacker sends a mass volume of ICMP echo requests to a target system, overwhelming it with traffic. The goal is to consume the target’s resources, such as network bandwidth or processing capacity., Smurf - The attacker sends a large volume of ICMP echo request packets to a network’s broadcast address using a spoofed source address, making it appear as if the requests are originating from the victim’s address., SSL attack - These protocols utilize cryptography to ensure the confidentiality and integrity of data being exchanged between clients and servers.. An attacker targets the specific protocols in several ways to disrupt the confidentiality and integrity and manipulate the data in question., Social Engineering - The manipulation of individuals to gain unauthorized access to sensitive information or systems. It involves exploiting human psychology rather than relying on technical vulnerabilities., Impersonation - Pretending to be someone else to gain trust and extract information., Phising attack - Sending deceptive emails, messages, or websites that appear to be from a trustworthy source to trick individuals into revealing sensitive information.,
0%
Common Attacks and Threats
Share
by
Echo15
Higher Education
Cybersecurity
Edit Content
Embed
More
Leaderboard
Show more
Show less
This leaderboard is currently private. Click
Share
to make it public.
This leaderboard has been disabled by the resource owner.
This leaderboard is disabled as your options are different to the resource owner.
Revert Options
Match up
is an open-ended template. It does not generate scores for a leaderboard.
Log in required
Visual style
Fonts
Subscription required
Options
Switch template
Show all
More formats will appear as you play the activity.
Open results
Copy link
QR code
Delete
Continue editing:
?