____ is designed to overwhelm the resources of a system to the point where it is unable to reply to legitimate service requests.
Denial-of-service attack (DoS)
____ attack is similar in that it also seeks to drain the resources of a system. A ___ attack is initiated by a vast array of malware-infected host machines controlled by the attacker.
Distributed Denial-of-service attack (DDoS)
These are referred to as ______ attacks because the victim site is unable to provide service to those who want to access it.
“denial of service”
One common way to prevent DoS attacks is to use a ____ that detects whether requests sent to your site are legitimate.
Firewall
____ types of cyber attacks refer to breaches in cybersecurity that make it possible for an attacker to eavesdrop on the data sent back and forth between two people, networks, or computers.
man-in-the-middle (MITM)
It is called a _____ attack because the attacker positions themselves in the “middle” or between the two parties trying to communicate.
“man in the middle”
Some ways to protect yourself and your organization from MITM attacks is by using strong encryption on access points or to use a ____
Virtual private network (VPN)
___ occurs when a malicious actor sends emails that seem to be coming from trusted, legitimate sources in an attempt to grab sensitive information from the target.
Phishing
____ combine social engineering and technology and are so-called because the attacker is, in effect, “fishing” for access to a forbidden area by using the “bait” of a seemingly trustworthy sender.
Phishing
____ is so-named because it goes after the “big fish” or whales of an organization, which typically include those in the C-suite or others in charge of the organization.
whale-phishing
The attacker takes the time to research their intended targets and then write messages the target is likely to find personally relevant.
Spear phishing
These types of attacks are aptly called ____ because of the way the attacker hones in on one specific target.
spear phishing
Often, a spear-phishing attack uses _____, where the information inside the “From” portion of the email is faked, making it look like the email is coming from a different sender.
email spoofing
the victim’s system is held hostage until they agree to pay a ransom to the attacker. After the payment has been sent, the attacker then provides instructions regarding how the target can regain control of their computer.
Ransomware
The name _____ is appropriate because the malware demands a ransom from the victim.
“ransomware”
The malware is written to exploit vulnerabilities that have not been addressed by either the system’s manufacturer or the IT team.
Ransomware
You can also prevent many ransomware attacks by using a _____ that can perform deep data packet inspections using artificial intelligence (AI) that looks for the characteristics of ransomware.
next generation firewall (NGFW)
Passwords are the access verification tool of choice for most people, so figuring out a target’s password is an attractive proposition for a hacker.
Password attacks
A ____ is a technique that uses common words and phrases, such as those listed in a dictionary, to try and guess the target’s password.
dictionary attack
A ____ password hack uses basic information about the individual or their job title to try to guess their password.
brute force
One effective method of preventing brute-force and dictionary password attacks is to set up a ___. This locks out access to devices, websites, or applications automatically after a certain number of failed attempts.
lock out policy
___ is a common method of taking advantage of websites that depend on databases to serve their users.
Structured Query Language injection (SQL)
The command is inserted, or “injected”, into a data plane in place of something else that normally goes there, such as a password or login. The server that holds the database then runs the command and the system is penetrated.
SQL Injection
If an _____succeeds, several things can happen, including the release of sensitive data or the modification or deletion of important data
SQL Injection