A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Types of Attacks

Brute-Force ​Attack​
Brute-Force ​Attack​

One example of a type of brute force attack is known as a dictionary attack, which might try all the words in a dictionary. Other forms of brute force attack might try commonly-used passwords or combinations of letters and numbers.

Cross-Site ​Scripting​
Cross-Site ​Scripting​

Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications. XSS enables attackers to inject client-side scripts into web pages viewed by other users. A cross-site scripting vulnerability may be used by attackers to bypass access controls such as the same-origin policy.

Denial-of-​Service Attack​
Denial-of-​Service Attack​

Denial-of-service attacks can be difficult to distinguish from common network activity, but there are some indications that an attack is in progress. What is a denial-of-service (DoS) attack? In a denial-of-service (DoS) attack, an attacker attempts to prevent legitimate users from accessing information or services.

source: us-cert.gov
Dictionary ​Attack​
Dictionary ​Attack​

A dictionary attack is a technique or method used to breach the computer security of a password-protected machine or server. A dictionary attack attempts to defeat an authentication mechanism by systematically entering each word in a dictionary as a password or trying to determine the decryption key of an encrypted message or document.

image: devhumor.com
Malware​
Malware​

Malware takes on many different forms and attacks in different ways. But with some thoughtful preparation and process improvements, as well as ongoing user education, your organization can gain-and-maintain a solid security stance against malware attacks.

source: rapid7.com
Man-in-the-​Middle Attack​
Man-in-the-​Middle Attack​

MiTM attacks pose a serious threat to online security because they give the attacker the ability to capture and manipulate sensitive information in real-time. The attack is a type of eavesdropping in which the entire conversation is controlled by the attacker.

Phishing​
Phishing​

Phishing attacks What is a phishing attack. Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message.

source: incapsula.com
image: astraid.com
SQL Injection​
SQL Injection​

SQL Injection Attack: What is it, and how to prevent it. The way that Yahoo! was hacked, SQL Injection attack, is the same method as many other hacks in the news recently: SQL Injection.

source: zdnet.com