This type of attack is designed to overwhelm the resources of a system to the point where it is unable to reply to legitimate service requests.
Denial-of-Service (DoS) Attack
A tool for monitoring network security
Splunk or POf or Argus or Nagios or OSSEC
is a weakness in the design, implementation, operation or internal controls in a process that could be exploited to violate the system security.
Vulnerability
refers to a specific type of targeted phishing attack. The attacker takes the time to research their intended targets and then write messages the target is likely to find personally relevant.
Spear-Phishing Attacks
This service allows users to remain anonymous, masking their identity/location and encrypts traffic.
VPN
Is anything capable of acting against an asset in a manner that can cause harm.
Threat
The most common applications for this attack are cracking passwords and cracking encryption keys.
Brute Force Attacks
This is a method of access control by which users must present multiple, separate pieces of identification, such as a password and keycard, in order to access a system.
Multi-Factor Authentication
Are solutions to software programming and coding errors.
Patches
This attack aims to make a service such as a website unusable by “flooding” it with malicious traffic or data from multiple sources (often botnets).
Distributed Denial of Service (DDoS)
When a URL has this at the beginning, it means that the information entered into the site is encrypted.
https
The path or route used to gain access to the target asset is known as an?
Attack Vector
This attack refers to threats that target vulnerabilities in web-based applications.
Web Attacks
A famous tool for Encryption in cybersecurity.
TrueCrypt or Tor or KeyPass
Surprise!
You got a 500 points