A word that refers to a known type of attack
What is an exploit?
Use a combination of upper, lower, number, and symbol there are 94*94*94*94--or 78,074,896--possible combinations for this.
What is a password?
Attacks of this type depend on using false data, or false data that is automatically generated.
What are spoofing attacks?
This term refers to bad software, from the French mal, meaning bad.
Keeping baseline information on a network and looking for changes is a form of this type of system hardening.
What is network monitoring?
Someone who gets paid by a company to attempt to hack into that company's web site, network, databases, etc.
Who is a pen-tester?
Longer and more complex passwords are harder to crack using this type of method?
What is brute force?
Software that captures all of the traffic on a network regardless of its destination.
What is a packet sniffer?
Scareware, encryption, and screen-locking are three versions of this kind of malware.
What is ransomware?
Because things change frequently, this should be an ongoing process.
What is system hardening?
A weakness in a computer operating system, network, software, or even human user.
What is a vulnerability?
A box with writing in it that is distorted, discolored, has lines running across and around it; a set of pictures, you are asked to identify all of the pictures with a cat; or a box that you check that says "I am not a robot" are all examples of this.
What is a Captcha?
This exploit occurs when the volume of data exceeds the storage capacity.
What is a buffer overflow?
Unlike its cousin Adware, this type of malware collects personal information from your computer.
What is spyware?
These are released to protect against known security flaws.
What are patches?
Taking advantage of the gullibility, kindness, or inexperience of an individual to obtain information or manipulate a computer system that will be used in a cyber attack.
What is social engineering?
A hacker uses an automated process to try to successfully log in to accounts with stolen or illegally obtained log in information.
What is credential stuffing?
An exploit where a hacker positions themselves in a conversation between a user and an application—either to eavesdrop or to impersonate one of the parties, making it appear as if a normal exchange of information is underway.
What is a man-in-the-middle attack?
The Stuxnet zero-day attack is an example of this form of malware.
What is a worm?
These types of updates are less obvious because you are not always alerted to them.
What are firmware updates?
Politeness, helping those who we like, helping those in need, and desire to be an expert/sought out/listened to are examples of this.
What are social norms?
In this type of attack, hackers try to guess your password off of a word list from previous breeches.
What is a dictionary or straight attack?
This the ultimate goal of a SQLi attack.
What is to gain control of a web application’s database server?
Boot Sector, resident, direct action, and polymorphic are types of this form of malware.
What are viruses?
Knowing these can help identify possible issues.
What are baseline statistics?