Cyber Threats Flashcards
DDoS
Distributed denial of service
A CyberAttack that floods a server with internet traffic to prevent users from accessing connected online services and sites.
DoS
Denial of Services
A cyberattack that makes a computer or device unavailable for users.
Zero-Day Attack
A cyberattack that exploits a previously unknown vulnerability that is not yet known by the providers of the software or service.
Spoofing
Faking ones identity in an attempt to obtain sensitive information or credentials.
Ie; Phishing
On-Path Attack
An intruder that sits between two connected devices or services, and copies/modifies their communications.
Ie; Sending users to the wrong websites; relaying false information between to entities
Brute Force Attack
A hacking method that uses trial and error to crack passwords, login credentials and encryption keys.
Simple, reliable and effective.
Dictionary Attack
A hacking method that systematically enters every word in a given dictionary as a password.
Can also be used to find keys that decrypt messages or documents.
Insider Attack
A cyberattack carried out by people that have authorized access to the system or network, making it one of the most dangerous attacks.
SQL Injection
A cyberattack where the hacker will exploit vulnerabilities made by programmers that allow them to send malicious commands to the database / web application.
Cross Site Scripting attack (XXS)
An injection type attack where malicious scripts are pushed into trusted websites, where they can be executed by users.