Explore tens of thousands of sets crafted by our community.
Common Network Attacks
20
Flashcards
0/20
DoS
Denial-of-Service attack floods a network or server to disrupt service. Prevention includes firewalls, anti-DoS software, and network hardware configurations.
Phishing
Phishing is a technique for tricking individuals into providing sensitive information by masquerading as a trustworthy entity in electronic communication. Common prevention methods include user education, spam filters, and internet security solutions.
MITM
Man-In-The-Middle attack is when an attacker secretly intercepts and possibly alters the communications between two parties. Use encrypted connections, strong authentication, and VPNs to prevent it.
DDoS
Distributed Denial-of-Service attack, similar to DoS but sourced from multiple locations. Mitigation includes increased bandwidth, DDoS protection services, and intrusion detection systems.
SQL Injection
SQL Injection involves inserting malicious SQL queries via user input fields to manipulate a database. Prevention methods include using prepared statements, stored procedures, and input validation.
Cross-Site Scripting (XSS)
XSS allows an attacker to inject malicious scripts into content from otherwise trusted websites. Prevent with content security policies, input encoding, and input validation.
Malware
Malware is any software intentionally designed to cause damage to a computer, server, client, or computer network. Antivirus software, firewalls, and user education are common prevention methods.
Trojan Horse
A Trojan Horse is malware that disguises itself as legitimate software. Prevent it with reliable antivirus software and by avoiding downloading software from unknown sources.
Ransomware
Ransomware is a type of malware that encrypts a victim's files and demands a ransom for the decryption key. Common prevention includes backing up data regularly, educating users, and keeping systems updated.
Zero-Day Exploit
A zero-day exploit targets specific vulnerabilities before they are known to the vendor. Mitigation includes using virtual patching, intrusion detection systems, and staying updated with patches.
Session Hijacking
Session Hijacking exploits the web session control mechanism to steal a user's session cookie. Use HTTPS, secure cookies, and session timeout limits to prevent it.
Dictionary Attack
Dictionary Attack is a method of breaking a password by systematically entering every word in a dictionary as a password. Prevention includes using complexity in passwords and account lockout policies.
Brute Force Attack
Brute Force Attack attempts to guess passwords through exhaustive effort rather than employing intellectual strategies. Use strong, complex passwords and enable account lockout policies to deter it.
Drive-By Download
Drive-By Download involves unintentionally downloading malicious software onto your device by visiting a compromised website. Employing up-to-date anti-malware tools, web browsers, and browser plug-ins are key preventatives.
Eavesdropping Attack
Eavesdropping Attack, or snooping, involves unauthorized real-time interception of private communications. Encryption, secure network protocols, and VPNs can prevent these attacks.
Spear Phishing
Spear Phishing is a more targeted form of phishing where attackers focus on specific individuals or companies. Use user training, spam filters, and email authentication to prevent it.
Rootkit
A Rootkit enables unauthorized users to gain control of a computer system without being detected. Defense strategies include secure system configurations, regular system scans, and keeping software updated.
Wi-Fi Eavesdropping
Wi-Fi Eavesdropping involves intercepting information transmitted over unsecured or public Wi-Fi networks. Using encrypted communication protocols, secure Wi-Fi networks and avoiding public Wi-Fi for sensitive transactions are advisable.
Clickjacking
Clickjacking tricks a user into clicking something different from what the user perceives, potentially revealing confidential information. Prevention methods include updating browser security settings, implementing frame busting scripts, and using web security headers.
Credential Stuffing
Credential Stuffing is an automated attack that uses breached username-password pairs to gain unauthorized access to user accounts. Use multi-factor authentication, require strong passwords, and educate users about password reuse to mitigate this threat.
© Hypatia.Tech. 2024 All rights reserved.