Cyber Attacks Flashcards
is a malicious and deliberate attempt by an
individual or organization to breach the information system of
another individual or organization. Usually, the attacker seeks
some type of benefit from disrupting the victim’s network.
Cyber attack
is the practice of sending fraudulent communications that
appear to come from a reputable source, usually through
email.
Malware
The goal is to steal sensitive data like credit card and login
information or to install malware on the victim’s machine.
Ransomware
is an increasingly common cyberthreat.
Phishing
also known as eavesdropping attacks, occur when attackers
insert themselves into a two-party transaction. Once the attackers
interrupt the traffic, they can filter and steal data.
Man-in –the-Middle Attack
floods systems, servers, or networks with traffic to exhaust
resources and bandwidth. As a result, the system is unable to
fulfill legitimate requests.
Denial-of-service Attack
occurs when an
attacker inserts malicious code into a server that uses SQL
and forces the server to reveal information it normally would
not.
Structured Query Language injection
hits after a network vulnerability is
announced but before a patch or solution is implemented.
Zero-day Exploit
While it can be useful for network troubleshooting and
bypassing restrictions, it can also be used by attackers to
conceal their activities and compromise systems.
DNS Tunneling
is a specialized attack that involves getting someone else’s
computer to do the work of generating cryptocurrency for you
(a process called mining in crypto lingo).
Cryptojacking
someone who uses a computer system to gain
unauthorized access to another system for data or who makes
another system unavailable.
Hacker
To break into your business and steal bank details, money or
confidential data. They usually use these stolen resources for their
own gain, to sell on to the black market or to extort the target
business.
Black Hat
A desire to help businesses, along with a passion for finding holes
in security networks.
White Hat
has all the skills of a Black and a White Hat hacker.
The difference is, they don’t care about stealing from people, nor do they
particularly want to help people. Instead, they like to play with systems and
enjoy the challenge of finding gaps, breaking protections and generally just
find hacking fun.
Grey Hat
often take existing code for malware and
viruses they find online, then modify it to meet their needs. They will
use this code to target the business or individual they feel has
wronged them and inflict their revenge.
Blue Hat