Logo
Pattern

Discover published sets by community

Explore tens of thousands of sets crafted by our community.

Cyber Attack Types

20

Flashcards

0/20

Still learning
StarStarStarStar

DDoS Attack

StarStarStarStar

Distributed Denial of Service attacks overwhelm a target's resources by flooding it with request traffic. Mitigation includes using DDoS protection services, implementing network redundancy, and filtering traffic.

StarStarStarStar

Malware

StarStarStarStar

Malicious software designed to harm or exploit any programmable device or network. Employ antivirus software, firewalls, and user education as mitigation strategies.

StarStarStarStar

Cross-Site Scripting (XSS)

StarStarStarStar

An attacker injects malicious scripts into content from otherwise trusted websites. Use Content Security Policy (CSP), input validation, and output escaping to mitigate.

StarStarStarStar

Ransomware

StarStarStarStar

A type of malicious software that encrypts the victim's files, making them inaccessible until a ransom is paid. Back up data regularly, keep systems updated, and train users to avoid this threat.

StarStarStarStar

MITM Attack

StarStarStarStar

Man-In-The-Middle attacks involve eavesdropping or altering communication between two parties. Use encryption, secure WiFi networks, and VPNs to mitigate these attacks.

StarStarStarStar

Zero-day Exploit

StarStarStarStar

An attack that targets software vulnerabilities which are unknown to the vendor. Keeping software updated, employing intrusion detection systems, and practicing good cyber hygiene help mitigate this risk.

StarStarStarStar

SQL Injection

StarStarStarStar

Attackers inject malicious SQL code into databases to manipulate or steal data. Mitigate by validating user inputs, using prepared statements, and limiting database permissions.

StarStarStarStar

Phishing

StarStarStarStar

A social engineering attack where attackers masquerade as a trustworthy entity to steal sensitive information. Mitigate by educating users, implementing advanced email filtering, and using multi-factor authentication.

StarStarStarStar

Trojan Horse

StarStarStarStar

A type of malware that disguises itself as legitimate software. Mitigate by not downloading software from untrusted sources, using reputable antivirus tools, and keeping software updated.

StarStarStarStar

Rootkit

StarStarStarStar

A set of malicious tools that enable unauthorized access to and control over a computer system. Mitigation involves using rootkit detection tools, practicing secure computing, and maintaining system integrity checks.

StarStarStarStar

Drive-by Download

StarStarStarStar

Unintended download of malicious software onto a device without consent. Mitigate by keeping operating systems and software updated, using web filters, and applying network security measures.

StarStarStarStar

Social Engineering

StarStarStarStar

A manipulation technique that exploits human error to gain private information, access, or valuables. Mitigation involves user education, enforcing strict protocols for information sharing, and verification processes.

StarStarStarStar

Credential Stuffing

StarStarStarStar

The automated injection of breached username/password pairs in order to gain unauthorized access to user accounts. Mitigation requires multi-factor authentication, password complexity requirements, and regular password changes.

StarStarStarStar

Adware

StarStarStarStar

Unwanted software designed to throw advertisements up on your screen, often slowing down the system. Use ad-blocking tools, avoid free downloads that serve ads, and run anti-malware scans to mitigate.

StarStarStarStar

Spyware

StarStarStarStar

Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. Anti-spyware tools, secure browsing habits, and firewalls are mitigation strategies.

StarStarStarStar

Clickjacking

StarStarStarStar

Tricking users into clicking something different from what they perceive, potentially revealing confidential information. Employ frame busting scripts, Content Security Policy (CSP), and user education to mitigate.

StarStarStarStar

Cryptojacking

StarStarStarStar

The unauthorized use of someone's computer to mine cryptocurrency. Mitigate by monitoring for abnormal resource usage, installing ad-blockers, and keeping systems updated.

StarStarStarStar

Insider Threat

StarStarStarStar

Threats to an organization that come from employees, contractors, or business associates. Mitigation involves monitoring behavior, restricting access to necessary data only, and conducting background checks.

StarStarStarStar

Eavesdropping Attack

StarStarStarStar

Listening to private conversations or data transfer without consent. Use encryption, secure protocols, and network security tools to mitigate eavesdropping.

StarStarStarStar

Session Hijacking

StarStarStarStar

Exploiting a valid computer session to gain unauthorized access to information or services in a computer system. Use session management security measures, timeouts, and encryption to mitigate.

Know
0
Still learning
Click to flip
Know
0
Logo

© Hypatia.Tech. 2024 All rights reserved.