CYBERSECURITY ATTACKS

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/11

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

12 Terms

1
New cards

Malware

Harmful software designed to damage, disrupt, or gain unauthorized access to computers, networks, or devices.

2
New cards

Phishing

A cyberattack technique where attackers trick individuals into revealing sensitive information through fraudulent communication.

3
New cards

DoS (Denial of Service)

A cyberattack that overwhelms a system with excessive traffic, causing it to slow down, crash, or become unavailable.

4
New cards

ICMP Flood

An example of a DoS attack that sends numerous ping requests to overload the network.

5
New cards

Man-in-the-Middle (MITM) Attack

An attack where a cybercriminal intercepts and manipulates communication between two parties.

6
New cards

Session Hijacking

A method used in MITM attacks to take over an active session by stealing cookies.

7
New cards

DNS Spoofing

A technique to redirect users to fake websites by tampering with DNS records.

8
New cards

SQL Injection (SQLi)

A cyberattack where malicious SQL code is inserted into an input field, exploiting database vulnerabilities.

9
New cards

Credential Stuffing

A type of attack where large volumes of stolen credentials are used to access multiple websites.

10
New cards

Zero-Day Exploit

A vulnerability in software unknown to the vendor, which has no available patch or fix.

11
New cards

Social Engineering

A manipulation technique used by attackers to trick individuals into divulging confidential information.

12
New cards

Smurf Attack

A type of DDoS attack that floods a target system with traffic using ICMP packets, spoofing the victim's IP address.