External Threats To Data Security Flashcards
Brute-force attacks
Automated or manual attempts to gain unauthorised access to secure areas by trying all possible password or key combinations.
Denial of service (DoS) attacks
Servers and devices are flooded with too many requests or packets, causing them to crash or become unusable.
Botnet
Short for robot network, a hacker will infect a zombie device which they can anonymously control to send spam, for DoS attacks or to mine cryptocurrency.
Shoulder surfing
Looking over someone’s shoulder when they enter a password or PIN.
Pharming
Cybercriminals install malicious code on your computers designed to redirect website traffic intended for one site, to a fakest official-looking website.
This can be used to harvest personal details from unsuspecting visitors.
Man-in-the-middle attack (MITM)
An attacker intercepts communication between the user and server to eavesdrop or alter information.
Phishing
Phishing emails or texts redirect a user to a fake website that here they trick the reader into divulging confidential information such as passwords that can be used fraudulently. Phishing phone calls can be used to obtain personal information or passwords.