Security + NET ATTACKS Flashcards
network attacks
bluejacking
**involves sending unsolicited messages **to Bluetooth-enabled devices, such as laptops, mobile phones, or PDAs
bluesnarfing
the unauthorized access of information from a wireless device through a Bluetooth connection,
Vishing
cyberattack that uses the phone to trick people into sharing sensitive information.
(SPIM) Spam Over Instant Messaging
Spam that is sent through instant messaging, SMS, or private messages on websites.
(intrusive ads, spyware, or viruses)
Smishing
phishing scam that uses text messages to trick people into sharing personal or financial information
Cryptographic attack
a malicious attempt to exploit a weakness in a cryptographic system and gain unauthorized access to sensitive information
Downgrade attack
take advantage of a system’s backward compatibility to force it into less secure modes of operation.
Deauthentication attack
type of denial-of-service (DoS) attack that disrupts the connection between a wireless device and its Wi-Fi access point
Denial-of-Service
attack that aims to disrupt, disable, or shut down a network, website, or service
Brute-force attack
a hacking method that uses trial and error to crack passwords, login credentials, and encryption keys.
Spoofing
` involves disguising information to trick people into believing they are interacting with a trusted source`
Replay attacks
eavesdropping on network traffic, capturing legitimate communication packets, and then replaying them to the target devic
Eavesdropping
used by cyberattackers to intercept communication and steal sensitive data in transit
Data interception
a type of data theft that involves the unauthorized redirection of information intended for one party to another
on-path attack
cyberattack where a malicious actor secretly positions themselves between two devices to intercept or modify communications between them
ARP poisoning
cyber attack carried out over a Local Area Network (LAN) that
- i
nvolves sending malicious ARP packets to a default gateway on a LAN in order to change the pairings in its IP to MAC address table
DNS poisoning (Domain Name System )
happens when fake information is entered into the cache of a domain name server, resulting in DNS queries producing an incorrect reply, sending users to the wrong website
Media Access Control (MAC) flooding
is a network attack that compromises the security of a network **SWITCH** by overflowing its memory used to store the MAC address table.
MAC spoofing
a technique for **changing **a factory-assigned Media Access Control (MAC) address
of a network interface on a networked device
MAC cloning
changing or impersonating the MAC address of a network interface card to match the MAC address of an authorized device on the network.
Domain hijacking
refers to a situation in which domain registrants due to unlawful actions of third parties lose control over their domain names.
URL hijacking
attackers* take advantage of common typos or misspellings* that users make when typing in the URL of a legitimate site.
Pharming
cyberattack that redirects a user’s browser to a fake website without their knowledge or consent
Typosquatting
** involves registering a domain name** that is similar to a legitimate website's but with an intentional typo