Cybersecurity attacks and stuff Flashcards
Malware
Software installed on someone’s computer w/o the user’s consent - usually to steal important info, cause a device to become unusable, or delete important files
Virus
Infects files, system areas, or network router’s hard drives and makes copies of itself - causes unwanted alteration or loss of data
DDos
Floods a server with internet traffic to prevent users from accessing connected online services and sites - increases website load time/prevents people from accessing a cite
Man in the Middle
Someone intercepts and possibly alters communication between two parties (w/o heir consent) - can hear sensitive information or impersonate one or both parties to steal data
Phishing
Attacks impersonate legitimate entities to trick individuals into providing sensitive information
DNS Hijacking
Someone intercepts and redirects DNS queries to a fraudulent website or server allowing them to redirect users to fake websites and steal personal info
SQL Injection
A technique that attackers use to gain unauthorized access to a web application database by adding a string of malicious code to a database query. Gives a SQL statement for a username and an ID
Buffer Overflow
When the amount of data in the buffer exceeds storage capacity - allows attackers to write over critical data
Zero Day Vulnerability
A vulnerability in a system or device that has been disclosed but is not yet patched