When the attacker sends a fraudulent message designed to trick the person into revealing sensitive information
Phishing
1 of 6
A code injection technique used to attack data-driven applications
SQL Injection
2 of 6
any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive users access to information or which unknowingly interferes w
Malware
3 of 6
consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly.
Brute-force attacks
4 of 6
an attack meant to shut down a machine or network, making it inaccessible to its intended users and this is done by flooding the target with traffic
Denial of Service Attacks
5 of 6
intercepting non- public transmissions of digital data to, from or within an information system
Data interception
6 of 6
Other cards in this set
Card 2
Front
A code injection technique used to attack data-driven applications
Back
SQL Injection
Card 3
Front
any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive users access to information or which unknowingly interferes w
Back
Card 4
Front
consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly.
Back
Card 5
Front
an attack meant to shut down a machine or network, making it inaccessible to its intended users and this is done by flooding the target with traffic
Comments
No comments have yet been made