Access Attacks

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/5

flashcard set

Earn XP

Description and Tags

Access Attacks for Cisco CyOps Associate

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

6 Terms

1
New cards
Password attack
Access attack where the threat actor attempts to discover critical system passwords using various methods
2
New cards
Spoofing attack
Access attack where the threat actor device attempts to pose as another device by falsifying data
3
New cards
Trust exploitation attack
Access attack where a threat actor uses unauthorized privileges to gain access to a system, possibly compromising the target
4
New cards
Port redirection attack
Access attack where a threat actor uses a compromised system as a base for attacks against other targets.
5
New cards
Man in the middle attack
Access attack where the threat actor is positioned in between two legitimate entities in order to read or modify the data that passes between the two parties.
6
New cards
Buffer overflow attack
Access attack where the threat actor exploits the buffer memory and overwhelms it with unexpected values. This usually renders the system inoperable, creating a DoS attack.