What is DOS Attack?
What is MITM Attack?
What is Session Hijacking?
An attacker guesses the session ID that is in use between a
client and a server
What is DNS Poisioning?
Involves corrupting the DNS cache to redirect users to malicious websites, making it a potent technique for intercepting web traffic and stealing sensitive information.
What is Rogue DHCP Server?
A DHCP server on a network which is not under the administrative control of the network administrators
What is Spoofing?
An attacker masquerades as another person by falsifying their identity
What is IP Spoofing?
Modifying the source address of an IP packet to hide the identity of the sender or impersonate another client
What is MAC Spoofing?
What is MAC Filtering?
Relies on a list of all known and authorized MAC addresses
What is ARP Spoofing?
What is VLAN Hopping?
Attacker exploits misconfigurations to gain unauthorized access to different VLAN
What is Double Tagging?
What is Switch Spoofing?
An attacker modifying a device’s MAC address to appear as an authorized switch port
What is Malware?
Designed to infiltrate a computer system and possibly damage it without the user’s knowledge or consent
What is Virus?
Made up of malicious code that is run on a machine without the user’s knowledge and infects it whenever that code is run
What is Worm?
A piece of malicious software that can replicate itself without user
interaction
What is Trojan Horse?
A piece of malicious software disguised as a piece of harmless or
desirable software
What is RAT?
What is Ransomware?
Restricts access to a victim’s computer system or files until a ransom or payment is received
What is Spyware?
Gathers information about you without your consent
What is Keylogger?
Captures any key strokes made on the victim machine
What is Rootkit?
Designed to gain administrative control over a computer system or network device without being detected
What is Rogue Access Point?
A wireless access point that has been installed on a secure network without authorization from a local network administrator
What is Shadow IT?
Use of IT systems, devices, software, applications, or services without the explicit approval of the IT department