Malware
Vulnerabilities
Topologies
Networks
100

  1. software that automatically displays or downloads advertising material (often unwanted) when a user is online.


Adware 

100

the fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

Phishing 

100

network topology in which each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node

Ring

100

network infrastructure within a small area.

LAN

200

 a malicious program that replicates itself, automatically spreading through a network.

worm 

200

a computer program that records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information.

Keylogger 

200

a type of network topology in which all devices in the network are connected by one central RJ-45 network cable or coaxial cable.

Bus 

200

network infrastructure for more than one geographic location.

WAN

300

 usually disguised as benign or useful software that you download from the Internet, but they actually carry malicious code designed to do harm—thus their name

Trojan 

300

consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly.

Brute force attack

300

 a type of network topology that resembles a tree.

Tree 

300

connects electronic devices within a user's immediate area

PAN

400

Holding data hostage in exchange for money 

Ransomware 

400

a cyberattack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other, as the attacker has inserted themselves between the two parties.

Man in the middle attack 

400

a type of network topology in which every device in the network is individually connected to a central node, known as the switch or hub

Star 

400

a computer network that connects computers within a metropolitan area

MAN

500

malicious code that works directly within a computer's memory instead of the hard drive.

Fileless Malware

500

 the act of secretly or stealthily listening to the private conversation or communications of others without their consent in order to gather information.

Eavesdropping 

500

a type of network topology in which all devices in the network are interconnected.

Mesh 

500

network of interconnected, dispersed LANs. Like MANs, campus networks extend coverage to buildings close in proximity.

Campus Area Network (CAN)

M
e
n
u