Cyber defense


SPOOFING is a type of cyber attack that imhumantes a device or user on a network.11



Download 2.54 Mb.
View original pdf
Page82/85
Date09.12.2022
Size2.54 Mb.
#60094
1   ...   77   78   79   80   81   82   83   84   85
Cyber Defense Handbook
10
SPOOFING is a type of cyber attack that imhumantes a device or user on a network.
11
PHARMING is a type of cyber attack in which web traffic is redirected to a fake site, exploiting software vulnerabilities in domain name systems (DNS) or in the users computers.
12
SNIFFING is a type of attack aimed at capturing traffic while it is being transmitted over the network, using a specific tool (sniffer, in order to analyze the network, obtain information or read communications.
13
WATERING HOLE is a type of cyber attack aimed at deceiving a group of specifically selected people by infecting the websites they usually use in order to obtain useful confidential information to carryout a cyber operation.
14
DENIAL of SERVICE ATTACK (DoS) is a type of cyber attack that seeks to make a machine, service or network resource unavailable to its legitimate users, by mass generation of superfluous requests in a short time looking to overload the system.
15
DISTRIBUTED DENIAL of SERVICE ATTACK (DDoS attack) is a DoS attack using multiple different sources (usually using botnets).
16
Man in the Middle (MitM) attack is a type of cyberattack in which a communication is intercepted, an interlocutor is supplanted and the other party is made to believe that communication is taking place with the authentic interlocutor.
17
SQL INJECTION is a type of cyber attack in which malicious SQL (Database Query Language) statements are inserted into an entry field of a database-based website for execution.
18
FLAME is a sophisticated modular malware (discovered in 2012) with the ability to spread to other systems across the network, record audio, capture screenshots, keyboard activity and network traffic, exploit devices connected by Bluetooth and make an external connection.
19
STUXNET is a cyber weapon (discovered in 2010) designed to attack supervisory control and data acquisition (SCADA) systems. It is alleged to be responsible for the cyber attack on the Iranian nuclear platform.

Download 2.54 Mb.

Share with your friends:
1   ...   77   78   79   80   81   82   83   84   85




The database is protected by copyright ©ininet.org 2024
send message

    Main page