GIT- Cyberattacks

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/11

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

12 Terms

1
New cards

malware

created to do harm to a computer, network, or server

2
New cards

denial-of-service attacks

floods the network with false request to disrupt the operation

3
New cards

phishing

uses email, sms, phone etc to entice a victim to share sensitive information

4
New cards

spoofing

cybercriminal disguises themselves as a known or trusted source.

5
New cards

identity-based attacks

hard to detect where a valid user’s credentials is compromised and an adversary is masquerading as that user.

6
New cards

code injection attacks

injecting malicious code into a vulnerable computer or network to change its course of action.

7
New cards

supply chain attacks

targets a trusted third-party vendor who offers services or software vital to the supply chain.

8
New cards

social engineering attacks

use psychological tactics to manipulate people into taking a desired action

9
New cards

insider threats

internal actors such as current or former employees that pose danger to an organization because they have direct access to the company’s sensitive resources

10
New cards

DNS tunneling

that leverages domain name system (DNS) queries and responses to bypass traditional security measures and transmit data and code within the network.

11
New cards

Internet of Things-Based Attacks

targets an IoT device or network where the hacker can assume control of the device, steal data

12
New cards

ai-powered attacks

Artificial Intelligence (AI) and Machine Learning (ML) technology has improved, its usage has also increased that attackers are now exploiting these same tools to commit cybercrimes.