Explore tens of thousands of sets crafted by our community.
Cyber Attack Types
20
Flashcards
0/20
DDoS Attack
Distributed Denial of Service attacks overwhelm a target's resources by flooding it with request traffic. Mitigation includes using DDoS protection services, implementing network redundancy, and filtering traffic.
Malware
Malicious software designed to harm or exploit any programmable device or network. Employ antivirus software, firewalls, and user education as mitigation strategies.
Cross-Site Scripting (XSS)
An attacker injects malicious scripts into content from otherwise trusted websites. Use Content Security Policy (CSP), input validation, and output escaping to mitigate.
Ransomware
A type of malicious software that encrypts the victim's files, making them inaccessible until a ransom is paid. Back up data regularly, keep systems updated, and train users to avoid this threat.
MITM Attack
Man-In-The-Middle attacks involve eavesdropping or altering communication between two parties. Use encryption, secure WiFi networks, and VPNs to mitigate these attacks.
Zero-day Exploit
An attack that targets software vulnerabilities which are unknown to the vendor. Keeping software updated, employing intrusion detection systems, and practicing good cyber hygiene help mitigate this risk.
SQL Injection
Attackers inject malicious SQL code into databases to manipulate or steal data. Mitigate by validating user inputs, using prepared statements, and limiting database permissions.
Phishing
A social engineering attack where attackers masquerade as a trustworthy entity to steal sensitive information. Mitigate by educating users, implementing advanced email filtering, and using multi-factor authentication.
Trojan Horse
A type of malware that disguises itself as legitimate software. Mitigate by not downloading software from untrusted sources, using reputable antivirus tools, and keeping software updated.
Rootkit
A set of malicious tools that enable unauthorized access to and control over a computer system. Mitigation involves using rootkit detection tools, practicing secure computing, and maintaining system integrity checks.
Drive-by Download
Unintended download of malicious software onto a device without consent. Mitigate by keeping operating systems and software updated, using web filters, and applying network security measures.
Social Engineering
A manipulation technique that exploits human error to gain private information, access, or valuables. Mitigation involves user education, enforcing strict protocols for information sharing, and verification processes.
Credential Stuffing
The automated injection of breached username/password pairs in order to gain unauthorized access to user accounts. Mitigation requires multi-factor authentication, password complexity requirements, and regular password changes.
Adware
Unwanted software designed to throw advertisements up on your screen, often slowing down the system. Use ad-blocking tools, avoid free downloads that serve ads, and run anti-malware scans to mitigate.
Spyware
Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. Anti-spyware tools, secure browsing habits, and firewalls are mitigation strategies.
Clickjacking
Tricking users into clicking something different from what they perceive, potentially revealing confidential information. Employ frame busting scripts, Content Security Policy (CSP), and user education to mitigate.
Cryptojacking
The unauthorized use of someone's computer to mine cryptocurrency. Mitigate by monitoring for abnormal resource usage, installing ad-blockers, and keeping systems updated.
Insider Threat
Threats to an organization that come from employees, contractors, or business associates. Mitigation involves monitoring behavior, restricting access to necessary data only, and conducting background checks.
Eavesdropping Attack
Listening to private conversations or data transfer without consent. Use encryption, secure protocols, and network security tools to mitigate eavesdropping.
Session Hijacking
Exploiting a valid computer session to gain unauthorized access to information or services in a computer system. Use session management security measures, timeouts, and encryption to mitigate.
© Hypatia.Tech. 2024 All rights reserved.