1-10.2 Attack Vectors - Digital Infrastructure Flashcards

1
Q

Manipulating a trusted source of data

A

Poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Impersonating a address, system or purpose

A

Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Attack designed to overwhelm system resources

A

Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Manipulating a browser to control a session including what is displayed

A

On-path attack (MiTM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Use of hardware and software to monitor and control physical processes in industrial settings

A

OT - Operation Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly