Information Security Attacks
What are
Information Security Attacks
Information security attacks are those attacks on information and data to steal, delete or misuse them. These attacsk are taking advantage of the weaknesses of either information technology or humans.
Related terms and methods:
- Adware
- Attack
- Backdoor
- Backup
- Baiting
- Brute force attack
- Computer worm
- Cracking
- Crime
- Cross-Site Request Forgery (CSRF)
- Cybercrime
- Cyber-Grooming
- DDoS (Dedistributed Denial of Service)
- Dictionary attack
- Disinformation
- DLP (Data Leakage Protection)
- DoS (Denial of Service)
- Eavesdropping
- Eavesdropping on the Network
- Encryption software
- Hacking
- Hoax
- Honeypot
- HTTP flood attack
- Identity theft
- IPS Intrusion Prevention Systems
- Keylogging
- Login and password data thefts
- MITM (Man In The Middle)
- Online Defamation - Cyber Libel
- Pharming
- Phishing
- Pretexting
- Quid Pro Quo Attack
- R-U-Dead-Yet attack
- Scam
- Security Token
- Sniffing
- Social Engineering
- Spamming
- Spoofing
- Spyware
- Stalking
- SYN flood attack
- Trojan horse
Related profession:
- CISO (Chief Information Security Officer)
- Security manager
Related software:
- Antispam
- Antispyware
- Antivirus
- Backup software
- Data Shredding Software
- Encryption software
- Firewall
- Identity management software
- Monitoring software
Read more
Security manager
Disinformation
Crime
Hacking
Cross-Site Request Forgery (CSRF)
Cracking
Spamming
Security Token
Cybercrime
Data Shredding Software
Monitoring software
IPS Intrusion Prevention Systems
Login and password data thefts
HTTP flood attack
DLP (Data Leakage Protection)
SYN flood attack
R-U-Dead-Yet attack
Backdoor
Attack
Eavesdropping on the Network
Did this article help you?
Rating:
Last update: 03.09.2016
Comments
You cannot contribute to the discussion because it is locked