Network Security

?
When the attacker sends a fraudulent message designed to trick the person into revealing sensitive information
Phishing
1 of 6
A code injection technique used to attack data-driven applications
SQL Injection
2 of 6
any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive users access to information or which unknowingly interferes w
Malware
3 of 6
consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly.
Brute-force attacks
4 of 6
an attack meant to shut down a machine or network, making it inaccessible to its intended users and this is done by flooding the target with traffic
Denial of Service Attacks
5 of 6
intercepting non- public transmissions of digital data to, from or within an information system
Data interception
6 of 6

Other cards in this set

Card 2

Front

A code injection technique used to attack data-driven applications

Back

SQL Injection

Card 3

Front

any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive users access to information or which unknowingly interferes w

Back

Preview of the front of card 3

Card 4

Front

consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly.

Back

Preview of the front of card 4

Card 5

Front

an attack meant to shut down a machine or network, making it inaccessible to its intended users and this is done by flooding the target with traffic

Back

Preview of the front of card 5
View more cards

Comments

No comments have yet been made

Similar Computing resources:

See all Computing resources »See all Networks resources »