Types of Attacks
Security Tools
Definition of
100

This type of attack is designed to overwhelm the resources of a system to the point where it is unable to reply to legitimate service requests.

Denial-of-Service (DoS) Attack

100

A tool for monitoring network security


Splunk or POf or Argus or Nagios or OSSEC

100

is a weakness in the design, implementation, operation or internal controls in a process that could be exploited to violate the system security.

Vulnerability

200

refers to a specific type of targeted phishing attack. The attacker takes the time to research their intended targets and then write messages the target is likely to find personally relevant.

Spear-Phishing Attacks

200

This service allows users to remain anonymous, masking their identity/location and encrypts traffic.

VPN

200

Is anything capable of acting against an asset in a manner that can cause harm.  

Threat

300

The most common applications for this attack are cracking passwords and cracking encryption keys.

Brute Force Attacks

300

This is a method of access control by which users must present multiple, separate pieces of identification, such as a password and keycard, in order to access a system.

Multi-Factor Authentication

300

Are solutions to software programming and coding errors.

Patches

400

This attack aims to make a service such as a website unusable by “flooding” it with malicious traffic or data from multiple sources (often botnets).

Distributed Denial of Service (DDoS)

400

When a URL has this at the beginning, it means that the information entered into the site is encrypted.

https

400

The path or route used to gain access to the target asset is known as an?

Attack Vector


500

This attack refers to threats that target vulnerabilities in web-based applications.

Web Attacks

500

A famous tool for Encryption in cybersecurity.

TrueCrypt or Tor or KeyPass

500

Surprise! 

You got a 500 points

M
e
n
u