Phishing, Brute Force Attacks And Denial Of Service Attacks

Beschreibung

GCSE Computer Science (Random Stuff) Karteikarten am Phishing, Brute Force Attacks And Denial Of Service Attacks, erstellt von Riley Loades am 10/05/2018.
Riley Loades
Karteikarten von Riley Loades, aktualisiert more than 1 year ago
Riley Loades
Erstellt von Riley Loades vor mehr als 6 Jahre
4
0

Zusammenfassung der Ressource

Frage Antworten
What is Phishing? Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication.
What are examples of phishing? Phishing emails usually appear to come from a well-known organization and ask for your personal information such as credit card number, social security number, account number or password. Often times phishing attempts appear to come from sites, services and companies with which you do not even have an account.
What is a brute force attack? A brute force attack is a trial-and-error method used to obtain information such as a user password or personal identification number (PIN). In a brute force attack, automated software is used to generate a large number of consecutive guesses as to the value of the desired data.
What are examples of a brute force attack? The most common and easiest to understand example of the brute-force attack is the dictionary attack to crack the password. In this, attacker uses a password dictionary that contains millions of words that can be used as a password. Then the attacker tries these passwords one by one for authentication.
What is a denial of service attack (D Dos) ? Distributed D Dos attack. A distributed denial-of-service (D Dos) attack occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers. Such an attack is often the result of multiple compromised systems (for example, a botnet) flooding the targeted system with traffic.
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

Computing Hardware - CPU and Memory
ollietablet123
SFDC App Builder 2
Parker Webb-Mitchell
Data Types
Jacob Sedore
Intake7 BIM L1
Stanley Chia
Software Processes
Nurul Aiman Abdu
Design Patterns
Erica Solum
CCNA Answers – CCNA Exam
Abdul Demir
Abstraction
Shannon Anderson-Rush
Spyware
Sam2
HTTPS explained with Carrier Pigeons
Shannon Anderson-Rush
Data Analytics
anelvr