1/11
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Malware
Harmful software designed to damage, disrupt, or gain unauthorized access to computers, networks, or devices.
Phishing
A cyberattack technique where attackers trick individuals into revealing sensitive information through fraudulent communication.
DoS (Denial of Service)
A cyberattack that overwhelms a system with excessive traffic, causing it to slow down, crash, or become unavailable.
ICMP Flood
An example of a DoS attack that sends numerous ping requests to overload the network.
Man-in-the-Middle (MITM) Attack
An attack where a cybercriminal intercepts and manipulates communication between two parties.
Session Hijacking
A method used in MITM attacks to take over an active session by stealing cookies.
DNS Spoofing
A technique to redirect users to fake websites by tampering with DNS records.
SQL Injection (SQLi)
A cyberattack where malicious SQL code is inserted into an input field, exploiting database vulnerabilities.
Credential Stuffing
A type of attack where large volumes of stolen credentials are used to access multiple websites.
Zero-Day Exploit
A vulnerability in software unknown to the vendor, which has no available patch or fix.
Social Engineering
A manipulation technique used by attackers to trick individuals into divulging confidential information.
Smurf Attack
A type of DDoS attack that floods a target system with traffic using ICMP packets, spoofing the victim's IP address.