This type of malware is designed to replicate itself and spread to other systems, often slowing down or crashing networks in the process.
What is a virus?
This basic security measure helps prevent unauthorized access to a network by requiring a username and password before granting access to system resources.
What is authentication?
This is a basic password policy practice where users are encouraged to create passwords that are difficult to guess by using a combination of uppercase, lowercase, numbers, and special characters.
What is password complexity?
This common type of phishing attack involves sending fraudulent emails that appear to be from reputable sources, attempting to trick recipients into providing sensitive information.
What is email phishing?
This type of wireless network, commonly used in homes and offices, operates on the 2.4 GHz and 5 GHz frequency bands, providing internet connectivity.
What is Wi-Fi?
This type of malware disguises itself as legitimate software, but once installed, it secretly tracks a user's actions and gathers sensitive data, often for malicious purposes.
What is spyware?
This security protocol is used to encrypt web traffic, ensuring data integrity and confidentiality between a user's browser and a website.
What is HTTPS?
This type of attack uses precomputed hash values for commonly used passwords to quickly crack password hashes without having to guess every possible combination.
What is a rainbow table attack?
This type of phishing attack involves cybercriminals creating nearly identical copies of legitimate websites to steal login credentials from unsuspecting users.
What is website spoofing?
This command-line tool is commonly used to crack wireless encryption protocols like WPA2 and WEP by performing brute-force attacks on captured handshake data.
What is Aircrack-ng?
A form of attack in which cybercriminals flood a network with traffic, overwhelming it and causing legitimate requests to be dropped, is known as this.
What is a DDoS (Distributed Denial of Service) attack?
This network security device monitors and controls incoming and outgoing network traffic based on predetermined security rules, often placed at the edge of a network.
What is a firewall?
This technique involves storing passwords as irreversible hashes combined with a unique "salt" to protect them from being easily cracked, even if the password database is compromised.
What is salted hashing?
A phishing attack that uses phone calls or voice messages to trick individuals into revealing confidential information is known as this.
What is vishing?
These signals, transmitted from aircraft to ground stations, help pilots and air traffic controllers determine the plane's position and altitude in real-time.
What is ADS-B?
This sophisticated form of malware infiltrates a network through phishing or other means and then remains dormant for a long period, allowing attackers to exfiltrate sensitive information undetected.
What is a Trojan Horse (or Advanced Persistent Threat - APT)?
A type of attack where an attacker intercepts and potentially alters the communication between two parties, often by impersonating one of them, is known as this.
What is a man-in-the-middle (MITM) attack?
This advanced attack involves leveraging botnets to distribute password guessing attempts across multiple devices and IP addresses to avoid detection, often using a combination of proxy networks and rapid-fire brute force techniques.
What is a distributed brute force attack (or botnet-powered brute force attack)?
This type of phishing attack specifically targets high-profile individuals like executives or government officials, often using personalized and sophisticated tactics.
What is spear phishing?
This type of wireless technology is used in passive RFID systems to transmit data from a tag to a reader by using backscatter communication, where the tag reflects the radio waves instead of generating its own signal. It's a popular choice for asset management and inventory tracking.
What is UHF (Ultra High Frequency) RFID?
This highly targeted type of malware focuses on financial transactions and often goes unnoticed by traditional security measures, aiming to steal banking credentials and access accounts.
What is a banking Trojan?
A hacking technique that allows an attacker to authenticate to a remote server or service by using the underlying NTLM or LanMan hash of a user's password, instead of requiring the associated plaintext password as is normally the case. It replaces the need for stealing the plaintext password to gain access with stealing the hash.
What is a pass the hash?
A class of security exploit related to online services. They involve anticipating a user signing up for an online service and signing up to the service in their name, and then taking over their account when they attempt to register it themselves.[1][2][3] The attack relies on confusion between accounts created by federated identity services and accounts created using e-mail addresses and passwords, and the failure of services to resolve this confusion correctly.
What is Account pre-hijacking?
Attackers use this advanced phishing technique to compromise an entire organization's network by hijacking a trusted email thread and injecting malicious links or attachments.
What is conversation hijacking (or business email compromise - BEC)?
A technology in Wi-Fi 6, improves wireless network performance by establishing independently modulating subcarriers within frequencies. This approach allows simultaneous transmissions to and from multiple clients.
What is OFDMA (Orthogonal Frequency Division Multiple Access)?