1-10.2 Attack Vectors - Digital Infrastructure Flashcards
1
Q
Manipulating a trusted source of data
A
Poisoning
2
Q
Impersonating a address, system or purpose
A
Spoofing
3
Q
Attack designed to overwhelm system resources
A
Denial of Service
4
Q
Manipulating a browser to control a session including what is displayed
A
On-path attack (MiTM)
5
Q
Use of hardware and software to monitor and control physical processes in industrial settings
A
OT - Operation Technology