Logo
Pattern

Discover published sets by community

Explore tens of thousands of sets crafted by our community.

Common Network Attacks

20

Flashcards

0/20

Still learning
StarStarStarStar

SQL Injection

StarStarStarStar

SQL Injection involves inserting malicious SQL queries via user input fields to manipulate a database. Prevention methods include using prepared statements, stored procedures, and input validation.

StarStarStarStar

Wi-Fi Eavesdropping

StarStarStarStar

Wi-Fi Eavesdropping involves intercepting information transmitted over unsecured or public Wi-Fi networks. Using encrypted communication protocols, secure Wi-Fi networks and avoiding public Wi-Fi for sensitive transactions are advisable.

StarStarStarStar

Zero-Day Exploit

StarStarStarStar

A zero-day exploit targets specific vulnerabilities before they are known to the vendor. Mitigation includes using virtual patching, intrusion detection systems, and staying updated with patches.

StarStarStarStar

DoS

StarStarStarStar

Denial-of-Service attack floods a network or server to disrupt service. Prevention includes firewalls, anti-DoS software, and network hardware configurations.

StarStarStarStar

DDoS

StarStarStarStar

Distributed Denial-of-Service attack, similar to DoS but sourced from multiple locations. Mitigation includes increased bandwidth, DDoS protection services, and intrusion detection systems.

StarStarStarStar

Eavesdropping Attack

StarStarStarStar

Eavesdropping Attack, or snooping, involves unauthorized real-time interception of private communications. Encryption, secure network protocols, and VPNs can prevent these attacks.

StarStarStarStar

Drive-By Download

StarStarStarStar

Drive-By Download involves unintentionally downloading malicious software onto your device by visiting a compromised website. Employing up-to-date anti-malware tools, web browsers, and browser plug-ins are key preventatives.

StarStarStarStar

Spear Phishing

StarStarStarStar

Spear Phishing is a more targeted form of phishing where attackers focus on specific individuals or companies. Use user training, spam filters, and email authentication to prevent it.

StarStarStarStar

Rootkit

StarStarStarStar

A Rootkit enables unauthorized users to gain control of a computer system without being detected. Defense strategies include secure system configurations, regular system scans, and keeping software updated.

StarStarStarStar

Malware

StarStarStarStar

Malware is any software intentionally designed to cause damage to a computer, server, client, or computer network. Antivirus software, firewalls, and user education are common prevention methods.

StarStarStarStar

Credential Stuffing

StarStarStarStar

Credential Stuffing is an automated attack that uses breached username-password pairs to gain unauthorized access to user accounts. Use multi-factor authentication, require strong passwords, and educate users about password reuse to mitigate this threat.

StarStarStarStar

Ransomware

StarStarStarStar

Ransomware is a type of malware that encrypts a victim's files and demands a ransom for the decryption key. Common prevention includes backing up data regularly, educating users, and keeping systems updated.

StarStarStarStar

Clickjacking

StarStarStarStar

Clickjacking tricks a user into clicking something different from what the user perceives, potentially revealing confidential information. Prevention methods include updating browser security settings, implementing frame busting scripts, and using web security headers.

StarStarStarStar

Cross-Site Scripting (XSS)

StarStarStarStar

XSS allows an attacker to inject malicious scripts into content from otherwise trusted websites. Prevent with content security policies, input encoding, and input validation.

StarStarStarStar

Brute Force Attack

StarStarStarStar

Brute Force Attack attempts to guess passwords through exhaustive effort rather than employing intellectual strategies. Use strong, complex passwords and enable account lockout policies to deter it.

StarStarStarStar

Phishing

StarStarStarStar

Phishing is a technique for tricking individuals into providing sensitive information by masquerading as a trustworthy entity in electronic communication. Common prevention methods include user education, spam filters, and internet security solutions.

StarStarStarStar

MITM

StarStarStarStar

Man-In-The-Middle attack is when an attacker secretly intercepts and possibly alters the communications between two parties. Use encrypted connections, strong authentication, and VPNs to prevent it.

StarStarStarStar

Trojan Horse

StarStarStarStar

A Trojan Horse is malware that disguises itself as legitimate software. Prevent it with reliable antivirus software and by avoiding downloading software from unknown sources.

StarStarStarStar

Session Hijacking

StarStarStarStar

Session Hijacking exploits the web session control mechanism to steal a user's session cookie. Use HTTPS, secure cookies, and session timeout limits to prevent it.

StarStarStarStar

Dictionary Attack

StarStarStarStar

Dictionary Attack is a method of breaking a password by systematically entering every word in a dictionary as a password. Prevention includes using complexity in passwords and account lockout policies.

Know
0
Still learning
Click to flip
Know
0
Logo

© Hypatia.Tech. 2024 All rights reserved.