Denial of Service Attack

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/18

flashcard set

Earn XP

Description and Tags

These flashcards cover key terminology and concepts related to Denial of Service attacks as presented in the lecture by Prof. Brian Zuel.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

19 Terms

1
New cards

Denial of Service (DoS)

A type of cyber attack aimed at making a system unavailable to its intended users by overwhelming it with traffic or exploiting system vulnerabilities.

2
New cards

Volumetric Attacks

A category of DoS attacks that involve overwhelming a target with a high volume of traffic to consume bandwidth.

3
New cards

SYN Flood

A DoS attack that exploits the TCP three-way handshake by sending SYN packets to a target without completing the handshake.

4
New cards

Smurf Attack

A DoS attack where the attacker sends ICMP packets with a spoofed source address to a broadcast address, causing all hosts to reply to the victim.

5
New cards

Ping Flood Attack

An attack where an attacker overwhelms a target with ICMP Echo Request (ping) packets.

6
New cards

Teardrop Attack

A type of DoS attack that sends fragmented packets to a target that cannot properly reassemble them.

7
New cards

DNS Spoofing

The act of corrupting the DNS cache to direct users to malicious sites instead of legitimate ones.

8
New cards

Session Hijacking

An attack where the hacker takes over a user session to gain unauthorized access to information or services.

9
New cards

Distributed Denial of Service (DDoS)

An attack that uses multiple compromised systems to launch a coordinated attack on a target, amplifying the attack's impact.

10
New cards

Botnet

A network of compromised devices controlled by an attacker, often used to perform DDoS attacks.

11
New cards

Intrusion Detection Systems (IDS)

Security solutions designed to detect unauthorized access or attacks on a network.

12
New cards

Encryption

A method of securing data by encoding it so that only authorized parties can access it.

13
New cards

Network threats

Potential dangers that can compromise the integrity, confidentiality, or availability of networked systems.

14
New cards

Man in the middle attack

An attack where the attacker secretly relays and possibly alters the communication between two parties.

15
New cards

Firewall

A network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.

16
New cards

Malware

Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.

17
New cards

Phishing

A social engineering technique where attackers send deceptive communications, such as emails, to trick individuals into revealing sensitive information or installing malware.

18
New cards

SQL Injection

A code injection technique used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution (e.g., to dump database contents to the attacker).

19
New cards

Cross-Site Scripting (XSS)

A type of security vulnerability typically found in web applications that enables attackers to inject client-side scripts into web pages viewed by other users.