Dictionary attack - A method of breaking a password by using a library of commonly used words or phrases to guess possible passwords, Brute Force attack - A password attack in which the attacker uses all possible combinations of characters until a password match is fouIt can take thousands of guesses before a password is cracked., SQL Injection - Where malicious code is injected into input fields of a web application’s database query., Buffer Overflow - Occurs when a program writes more data to a block of memory than it was allocated to hold, which can lead to the overwriting of adjacent memory areas, unpreditacble behavior, system crashes, or allowing attackers to execute malicious code., Spoofing - The deceptive practice of assuming a false identity or falsifying information to gain unauthorized access or deceive users and systems., MiTM - Involves an unauthorized third party intercepting and potentially altering communication between two parties without their knowledge., ARP Poisoning - Involves manipulating or corrupting the ARP cache on a local network. The attacker sends falsified messages, assocating their MAC address with the IP address of a legitimate network device., DoS attack - A malicious attempt to disrupt the normal functioning of a targeted system, service, or network by overwhelming it with a flood of illegitimate requests or traffic., Ping of Death - Exploits vulnerabilities in the Internet Control Message Protocol (ICMP) by sending malformed or oversized packets to a target system., Ping Flood - Where an attacker sends a mass volume of ICMP echo requests to a target system, overwhelming it with traffic. The goal is to consume the target’s resources, such as network bandwidth or processing capacity., Smurf - The attacker sends a large volume of ICMP echo request packets to a network’s broadcast address using a spoofed source address, making it appear as if the requests are originating from the victim’s address., SSL attack - These protocols utilize cryptography to ensure the confidentiality and integrity of data being exchanged between clients and servers.. An attacker targets the specific protocols in several ways to disrupt the confidentiality and integrity and manipulate the data in question., Social Engineering - The manipulation of individuals to gain unauthorized access to sensitive information or systems. It involves exploiting human psychology rather than relying on technical vulnerabilities., Impersonation - Pretending to be someone else to gain trust and extract information., Phising attack - Sending deceptive emails, messages, or websites that appear to be from a trustworthy source to trick individuals into revealing sensitive information.,
0%
Common Attacks and Threats
Podeli
autor
Echo15
Higher Education
Cybersecurity
Uredi sadržaj
Odštampaj
Ugradi
Više
Zadatke
Tabela
Prikaži više
Prikaži manje
Ova tabela je trenutno privatna. Kliknite na
Podeli
da biste je objavili.
Pristup tabeli je onemogućio vlasnik sredstva.
Ova tabela je onemogućena pošto Vam se podešavanja razlikuju od podešavanja vlasnika sredstva.
Vrati podešavanja
Spoji
je otvoreni šablon. On ne generiše rezultate za tabelu rangiranja.
Prijava je obavezna
Vizuelni stil
Fontove
Potrebna je pretplata
Postavke
Promeni šablon
Prikaži sve
Više formata će se pojaviti tokom igranja aktivnosti.
Otvoreni rezultati
Kopiraj vezu
QR kôd
Izbriši
Vrati automatski sačuvano:
?