ICT
ARCHITECTURE OF 8085
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
frontal attack
|
|
passive attacks
|
|
brainstorm
|
|
active attacks
|
|
flank attack
|
Detailed explanation-1: -Malware Attack. This is one of the most common types of cyberattacks. Phishing Attack. Password Attack. Man-in-the-Middle Attack. SQL Injection Attack. Denial-of-Service Attack. Insider Threat. Cryptojacking. More items •29-Mar-2023
Detailed explanation-2: -An attack on a secure communication protocol where the attacker transmits data to the claimant, Credential Service Provider (CSP), verifier, or Relying Party (RP).
Detailed explanation-3: -Active attacks attempt to modify, destroy or disrupt network or system resources, while passive attacks attempt to steal or monitor sensitive data. Both types of attacks can be dangerous, compromising confidentiality, integrity, and availability of systems and data, and leading to financial and reputational losses.
Detailed explanation-4: -Session Hijacking Attack. In a session hijacking attack, also known as session replay, playback attacks, or replay attacks, the threat actors copy the internet session ID information of the target. Message Modification Attack. Masquerade Attack. Denial-of-Service (DoS) Attack. 23-Dec-2022
Detailed explanation-5: -Malware. Denial-of-Service (DoS) Attacks. Phishing. Spoofing. Identity-Based Attacks. Code Injection Attacks. Supply Chain Attacks. Insider Threats. More items •13-Feb-2023