Explore tens of thousands of sets crafted by our community.
Common Network Attacks
20
Flashcards
0/20
SQL Injection
SQL Injection involves inserting malicious SQL queries via user input fields to manipulate a database. Prevention methods include using prepared statements, stored procedures, and input validation.
Wi-Fi Eavesdropping
Wi-Fi Eavesdropping involves intercepting information transmitted over unsecured or public Wi-Fi networks. Using encrypted communication protocols, secure Wi-Fi networks and avoiding public Wi-Fi for sensitive transactions are advisable.
Zero-Day Exploit
A zero-day exploit targets specific vulnerabilities before they are known to the vendor. Mitigation includes using virtual patching, intrusion detection systems, and staying updated with patches.
DoS
Denial-of-Service attack floods a network or server to disrupt service. Prevention includes firewalls, anti-DoS software, and network hardware configurations.
DDoS
Distributed Denial-of-Service attack, similar to DoS but sourced from multiple locations. Mitigation includes increased bandwidth, DDoS protection services, and intrusion detection systems.
Eavesdropping Attack
Eavesdropping Attack, or snooping, involves unauthorized real-time interception of private communications. Encryption, secure network protocols, and VPNs can prevent these attacks.
Drive-By Download
Drive-By Download involves unintentionally downloading malicious software onto your device by visiting a compromised website. Employing up-to-date anti-malware tools, web browsers, and browser plug-ins are key preventatives.
Spear Phishing
Spear Phishing is a more targeted form of phishing where attackers focus on specific individuals or companies. Use user training, spam filters, and email authentication to prevent it.
Rootkit
A Rootkit enables unauthorized users to gain control of a computer system without being detected. Defense strategies include secure system configurations, regular system scans, and keeping software updated.
Malware
Malware is any software intentionally designed to cause damage to a computer, server, client, or computer network. Antivirus software, firewalls, and user education are common prevention methods.
Credential Stuffing
Credential Stuffing is an automated attack that uses breached username-password pairs to gain unauthorized access to user accounts. Use multi-factor authentication, require strong passwords, and educate users about password reuse to mitigate this threat.
Ransomware
Ransomware is a type of malware that encrypts a victim's files and demands a ransom for the decryption key. Common prevention includes backing up data regularly, educating users, and keeping systems updated.
Clickjacking
Clickjacking tricks a user into clicking something different from what the user perceives, potentially revealing confidential information. Prevention methods include updating browser security settings, implementing frame busting scripts, and using web security headers.
Cross-Site Scripting (XSS)
XSS allows an attacker to inject malicious scripts into content from otherwise trusted websites. Prevent with content security policies, input encoding, and input validation.
Brute Force Attack
Brute Force Attack attempts to guess passwords through exhaustive effort rather than employing intellectual strategies. Use strong, complex passwords and enable account lockout policies to deter it.
Phishing
Phishing is a technique for tricking individuals into providing sensitive information by masquerading as a trustworthy entity in electronic communication. Common prevention methods include user education, spam filters, and internet security solutions.
MITM
Man-In-The-Middle attack is when an attacker secretly intercepts and possibly alters the communications between two parties. Use encrypted connections, strong authentication, and VPNs to prevent it.
Trojan Horse
A Trojan Horse is malware that disguises itself as legitimate software. Prevent it with reliable antivirus software and by avoiding downloading software from unknown sources.
Session Hijacking
Session Hijacking exploits the web session control mechanism to steal a user's session cookie. Use HTTPS, secure cookies, and session timeout limits to prevent it.
Dictionary Attack
Dictionary Attack is a method of breaking a password by systematically entering every word in a dictionary as a password. Prevention includes using complexity in passwords and account lockout policies.
© Hypatia.Tech. 2024 All rights reserved.