1/9
Attack Types
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Network of robot computers
Botnet
A program that usually hides in the OS tools, so it's almost impossible to detect
Rootkit
A program that disguises itself as a useful program and can install a backdoor or rootkit on a computer
Trojan
An attack that uses a large ICMP packet to causes the victim computer to freeze and malfunction
Ping of Death
An attack that prevents legitimate users from accessing network resources
DoS
Attackers inject themselves between two parties or systems communicating with one another
Man-in-the-Middle
Hardware devices or software that can be used to capture keystrokes on a computer
Keyloggers
Malicious software introduced into a network to help an attacker accomplish their goals
Malware
Malicious program that attaches itself to a file or another program
Virus
Virus that locks a target system until a demanded fee is paid
Ransomware