Security + NET ATTACKS Flashcards
network attacks
bluejacking
**involves sending unsolicited messages **to Bluetooth-enabled devices, such as laptops, mobile phones, or PDAs
bluesnarfing
the unauthorized access of information from a wireless device through a Bluetooth connection,
Vishing
cyberattack that uses the phone to trick people into sharing sensitive information.
(SPIM) Spam Over Instant Messaging
Spam that is sent through instant messaging, SMS, or private messages on websites.
(intrusive ads, spyware, or viruses)
Smishing
phishing scam that uses text messages to trick people into sharing personal or financial information
Cryptographic attack
a malicious attempt to exploit a weakness in a cryptographic system and gain unauthorized access to sensitive information
Downgrade attack
take advantage of a system’s backward compatibility to force it into less secure modes of operation.
Deauthentication attack
type of denial-of-service (DoS) attack that disrupts the connection between a wireless device and its Wi-Fi access point
Denial-of-Service
attack that aims to disrupt, disable, or shut down a network, website, or service
Brute-force attack
a hacking method that uses trial and error to crack passwords, login credentials, and encryption keys.
Spoofing
` involves disguising information to trick people into believing they are interacting with a trusted source`
Replay attacks
eavesdropping on network traffic, capturing legitimate communication packets, and then replaying them to the target devic
Eavesdropping
used by cyberattackers to intercept communication and steal sensitive data in transit
Data interception
a type of data theft that involves the unauthorized redirection of information intended for one party to another
on-path attack
cyberattack where a malicious actor secretly positions themselves between two devices to intercept or modify communications between them
ARP poisoning
cyber attack carried out over a Local Area Network (LAN) that
- i
nvolves sending malicious ARP packets to a default gateway on a LAN in order to change the pairings in its IP to MAC address table