Network Threats and Attacks Flashcards
Malicious software includes viruses, worms, Trojans, ransomware, and spyware that can infect systems, steal data, or disrupt operations.
Malware
A fraudulent attempt to obtain sensitive information (such as usernames, passwords, and financial details) by impersonating a trusted entity via email or other communication channels.
Phishing
Overwhelm a network or website with excessive traffic or requests, causing it to become unavailable.
Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks
An attacker intercepts and possibly alters communication between two parties without their knowledge.
Man-in-the-Middle (MitM) Attacks
Attackers insert malicious SQL queries into input fields to manipulate a database, potentially gaining unauthorized access to data.
SQL Injection
Injecting malicious scripts into web pages viewed by other users, compromising their browsing experience or stealing their data.
Cross-Site Scripting (XSS)
Attacks that target vulnerabilities in software or hardware that are not yet known to the vendor or public, giving no time for patches.
Zero-Day Exploits
Includes brute force attacks, dictionary attacks, and credential stuffing, aiming to gain unauthorized access by exploiting weak or stolen passwords.
Password Attacks
Malicious or negligent actions by employees or trusted individuals within an organization that can compromise security.
Insider Threats
Unauthorized devices (e.g., rogue access points) added to a network that can be used to eavesdrop or gain access.
Rogue Devices
Unauthorized interception of network traffic to capture sensitive data.
Eavesdropping/Sniffing
Manipulating individuals into divulging confidential information or performing actions that compromise security.
Social Engineering
Malicious advertisements that can infect systems when clicked on.
Malvertising
Internet of Things devices with security weaknesses that can be exploited by attackers.
IoT Vulnerabilities
Malicious software is automatically downloaded and installed when a user visits a compromised website.
Drive-By Downloads
Unauthorized copying, transfer, or retrieval of data from an organization’s network.
Data Exfiltration
Intercepting and analyzing data packets in transit to obtain sensitive information.
Packet Sniffing
Manipulating DNS records to redirect users to malicious websites or hijack their traffic.
DNS Spoofing/Cache Poisoning
Repeatedly trying all possible combinations of passwords or encryption keys until the correct one is found.
Brute Force Attacks
Scanning for and exploiting vulnerabilities in wireless networks.
Wardriving