Port 80
What is Hyper Text Transfer Protocol (HTTP)?
Malware that allows an attacker to take control of a system from a remote location
What is RAT(Remote Access Trojan)?
One person follows behind another person with out using credentials in this attack.
What is tailgating?
An attack from a single source that attempts to disrupt the services provided by the attacked system
What is a Denial of Service(DoS) attack?
The practice of sending email to users with the purpose of tricking them into revealing personal information or clicking on a link
What is Phishing?
This Port is used for Telnet, an unencrypted method to remotely administer a device.
What is port 23?
Self-replicating malware that travels through a network. Do not need user interaction to execute.
What is a worm?
The practice of searching through trash looking to gain information from discarded documents
What is dumpster diving?
A web application vulnerability. Attackers embed malicious HTML or JavaScript code into a web site's code, which executes when a user visits the site.
What is Cross-site scripting(XSS)?
A form of spear phishing that attempts to target high-level executives
What is Whaling?
Port 110, used to receive email from a mail server
What is Post Office Protocol v3 (POP3)?
A type of malware that has system-level access to a computer.
A physical security mechanism designed to control access to a secure area
What is a mantrap?
This is an attack using active interception or eavesdropping. It uses a third computer to capture traffic sent between two other systems.
What is a Man-in-the-middle Attack?
An attack method that infects web sites that a group is likely to trust and visit.
What is a Watering Hole attack?
This port is used for transmission of web page data to a client over an SSL/TLS encrypted connection
What is port 443(HTTPS)?
A type of malware that executes in response to an event. The event might be a Special date or time, or a user action such as when a user launches a specific program.
What is a logic bomb?
Small credit card-sized that uses NFC to authorize personnel to open doors
What is a proximity card?
This is a password attack that captures and uses the hash of a password It attempts to log on as the user with the hash
What is Pass the hash?
The purchase of a domain name that is close to a legitimate domain name. Attackers often try to trick users who inadvertently use the wrong domain name. Also called URL hijacking.
What is Typo Squatting?
Remote Desktop Protocol(RDP) is used to remotely view and control other Windows systems uses this port
What is port 3389?
A type of ransomware that encrypts the user's data.
What is Crypto-malware?
PTZ is an acronym for this feature in in many CCTV systems
What is Pan Tilt Zoom?
this is the process of gaining elevated rights and permissions
What is Privilege Escalation?
You can use a screen filter to protect against and reduce the success of this social engendering attack
What is shoulder surfing?