Types of attacks Flashcards
What is a Denial-of-Service (DoS) attack?
Denial-of-Service (DoS) attack: Overwhelming a system with traffic to make it unavailable.
What is a Distributed Denial-of-Service (DDoS) attack?
Distributed Denial-of-Service (DDoS) attack: Using multiple systems to overwhelm a target with traffic.
What is a botnet?
Botnet: A network of infected computers controlled by an attacker.
What is command and control in cybersecurity?
Command and control: A server or infrastructure used to control a botnet.
What is an on-path attack (previously known as man-in-the-middle attack)?
On-path attack (man-in-the-middle attack): Intercepting and altering communication between two parties.
What is DNS poisoning?
DNS poisoning: Corrupting DNS data to redirect traffic to malicious sites.
What is VLAN hopping?
VLAN hopping: Gaining unauthorized access to a VLAN by exploiting switch configuration.
What is ARP spoofing?
ARP spoofing: Sending false ARP messages to associate an attacker?s MAC address with the IP address of a legitimate device.
What is a rogue DHCP server?
Rogue DHCP server: Unauthorized DHCP server providing incorrect IP configurations.
What is a rogue access point (AP)?
Rogue access point (AP): Unauthorized wireless access point set up by an attacker.
What is an evil twin attack?
Evil twin attack: Setting up a fake wireless access point to intercept data.
What is ransomware?
Ransomware: Malware that encrypts files and demands payment for decryption.
What are password attacks?
Password attacks: Attempts to obtain or decrypt passwords.
What is a brute-force attack?
Brute-force attack: Trying all possible password combinations to gain access.
What is a dictionary attack?
Dictionary attack: Using a list of common passwords to attempt to gain access.
What is MAC spoofing?
MAC spoofing: Changing a device?s MAC address to impersonate another device.
What is IP spoofing?
IP spoofing: Sending packets with a false IP address to hide the sender’s identity.
What is a deauthentication attack?
Deauthentication attack: Forcing a device to disconnect from a network.
What is malware?
Malware: Malicious software designed to harm or exploit systems.
What is social engineering?
Social engineering: Manipulating people to divulge confidential information.
What is phishing?
Phishing: Fraudulent attempts to obtain sensitive information by pretending to be a trustworthy entity.
What is tailgating?
Tailgating: Gaining unauthorized access to a secure area by following someone with proper access.
What is piggybacking?
Piggybacking: Similar to tailgating, but with the knowledge and consent of the person being followed.
What is shoulder surfing?
Shoulder surfing: Watching someone enter sensitive information, such as a PIN or password.