1/11
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
malware
created to do harm to a computer, network, or server
denial-of-service attacks
floods the network with false request to disrupt the operation
phishing
uses email, sms, phone etc to entice a victim to share sensitive information
spoofing
cybercriminal disguises themselves as a known or trusted source.
identity-based attacks
hard to detect where a valid user’s credentials is compromised and an adversary is masquerading as that user.
code injection attacks
injecting malicious code into a vulnerable computer or network to change its course of action.
supply chain attacks
targets a trusted third-party vendor who offers services or software vital to the supply chain.
social engineering attacks
use psychological tactics to manipulate people into taking a desired action
insider threats
internal actors such as current or former employees that pose danger to an organization because they have direct access to the company’s sensitive resources
DNS tunneling
that leverages domain name system (DNS) queries and responses to bypass traditional security measures and transmit data and code within the network.
Internet of Things-Based Attacks
targets an IoT device or network where the hacker can assume control of the device, steal data
ai-powered attacks
Artificial Intelligence (AI) and Machine Learning (ML) technology has improved, its usage has also increased that attackers are now exploiting these same tools to commit cybercrimes.