Podcast
Questions and Answers
Denial of service (DoS) attack is any type of attack that causes a complete or partial system ______.
Denial of service (DoS) attack is any type of attack that causes a complete or partial system ______.
outage
An attacker could send a maliciously formatted file to a server that causes it to ______.
An attacker could send a maliciously formatted file to a server that causes it to ______.
overload
A DDoS attack is a DoS attack that comes from more than one source at the same ______.
A DDoS attack is a DoS attack that comes from more than one source at the same ______.
time
The machines used in DDoS attacks are collectively known as ______.
The machines used in DDoS attacks are collectively known as ______.
Signup and view all the answers
According to research, tens of millions of computers are likely to be infected with ______ programs worldwide.
According to research, tens of millions of computers are likely to be infected with ______ programs worldwide.
Signup and view all the answers
An attacker could send a large number of page requests to a web server in a short ______ of time, overloading it.
An attacker could send a large number of page requests to a web server in a short ______ of time, overloading it.
Signup and view all the answers
A similar impact is observed with ticket sales websites where a spike in user demand can ______ systems.
A similar impact is observed with ticket sales websites where a spike in user demand can ______ systems.
Signup and view all the answers
Often, cyber attacks are not technical, but rather an exploitation of how humans interact with the system in a flawed and ______ way.
Often, cyber attacks are not technical, but rather an exploitation of how humans interact with the system in a flawed and ______ way.
Signup and view all the answers
In this lesson, we have selected common types of cyber attacks. This is a representative sample to provide you with a few illustrative examples, rather than a ______ list.
In this lesson, we have selected common types of cyber attacks. This is a representative sample to provide you with a few illustrative examples, rather than a ______ list.
Signup and view all the answers
Let's examine these in ______ depth.
Let's examine these in ______ depth.
Signup and view all the answers
Roll-over the color-coded types of threats and ______.
Roll-over the color-coded types of threats and ______.
Signup and view all the answers
Go to the Fortinet Threat Map Screen shot of the online Fortinet Threat map showing ______ around the globe.
Go to the Fortinet Threat Map Screen shot of the online Fortinet Threat map showing ______ around the globe.
Signup and view all the answers
Watch the attack details that scroll at the bottom of the screen. Figure out where most ______ are happening right now, before your eyes.
Watch the attack details that scroll at the bottom of the screen. Figure out where most ______ are happening right now, before your eyes.
Signup and view all the answers
This is a sub-set of ______. Select . to view the legend of types of ______ displayed. Select i to learn more.
This is a sub-set of ______. Select . to view the legend of types of ______ displayed. Select i to learn more.
Signup and view all the answers
Go to the Bitdefender Cyberthreat Real-Time Map Screen shot of the online Bitdefender Threat map showing ______ around the world.
Go to the Bitdefender Cyberthreat Real-Time Map Screen shot of the online Bitdefender Threat map showing ______ around the world.
Signup and view all the answers
View the live ______ happening across the map for the selected country locations.
View the live ______ happening across the map for the selected country locations.
Signup and view all the answers
Check out the various instances of ______, threats, and attacks.
Check out the various instances of ______, threats, and attacks.
Signup and view all the answers
Notice that there is an 'attack country' and 'target country'. This is the end of the lesson.
Notice that there is an 'attack country' and 'target country'. This is the end of the lesson.
Signup and view all the answers
Be sure to select the 'I've checked it out' box to take a mini quiz to check your understanding of this lesson.
Be sure to select the 'I've checked it out' box to take a mini quiz to check your understanding of this lesson.
Signup and view all the answers
You will be presented with three descriptions to then identify the correct type of ______ that it represents. This is required for lesson completion.
You will be presented with three descriptions to then identify the correct type of ______ that it represents. This is required for lesson completion.
Signup and view all the answers
the ______ barked
the ______ barked
Signup and view all the answers
the ______ meowed
the ______ meowed
Signup and view all the answers
______ attack is the practice of sending messages that appear to be from trusted sources with the goal of gaining personal information or influencing users to do something. It combines social engineering and technical trickery. Unsuspecting users open the email and may provide protected information or download malware. EXAMPLE An attacker could send an email with a file attachment or a link to a fake website that loads malware onto a target's computer.
______ attack is the practice of sending messages that appear to be from trusted sources with the goal of gaining personal information or influencing users to do something. It combines social engineering and technical trickery. Unsuspecting users open the email and may provide protected information or download malware. EXAMPLE An attacker could send an email with a file attachment or a link to a fake website that loads malware onto a target's computer.
Signup and view all the answers
______ attacks are a very targeted type of phishing activity. Attackers take the time to conduct research into targets and create messages that are personal and relevant, and thus likely more effective. EXAMPLE An attacker collects a target's details from social media and calls the target pretending to be a representative from the bank. The attacker advises the account is compromised and asks the target to transfer money to a "safe" bank account. The attack is convincing because of the attacker's apparently legitimate knowledge.
______ attacks are a very targeted type of phishing activity. Attackers take the time to conduct research into targets and create messages that are personal and relevant, and thus likely more effective. EXAMPLE An attacker collects a target's details from social media and calls the target pretending to be a representative from the bank. The attacker advises the account is compromised and asks the target to transfer money to a "safe" bank account. The attack is convincing because of the attacker's apparently legitimate knowledge.
Signup and view all the answers
______ is a catch-all term for malicious software. It is any software designed to perform in a detrimental manner to a targeted user without the user's informed consent. It often triggers secretly when a user runs a program or downloads a file, which can often be unintentional. Once active, malware can block access to data and programs, steal information, and make systems inoperable. EXAMPLE Within the various types of malware, you will find examples related to their function, such as keyloggers (which captures a victim's keystrokes) or ransomware (which holds a victim's files captive in exchange for a ransom payment).
______ is a catch-all term for malicious software. It is any software designed to perform in a detrimental manner to a targeted user without the user's informed consent. It often triggers secretly when a user runs a program or downloads a file, which can often be unintentional. Once active, malware can block access to data and programs, steal information, and make systems inoperable. EXAMPLE Within the various types of malware, you will find examples related to their function, such as keyloggers (which captures a victim's keystrokes) or ransomware (which holds a victim's files captive in exchange for a ransom payment).
Signup and view all the answers
A MitM attack occurs when hackers insert themselves in the communications between a client and a server. This allows hackers to see what’s being sent and received by both sides. EXAMPLE An attacker could set up a "free" WiFi hot spot in a popular public location. Anyone who connects to that WiFi network could have their communications examined by the attacker, who may redirect victims to fake log-in screens or insert advertisements over webpages.
A MitM attack occurs when hackers insert themselves in the communications between a client and a server. This allows hackers to see what’s being sent and received by both sides. EXAMPLE An attacker could set up a "free" WiFi hot spot in a popular public location. Anyone who connects to that WiFi network could have their communications examined by the attacker, who may redirect victims to fake log-in screens or insert advertisements over webpages.
Signup and view all the answers
DNS is one of the core protocols used on the internet. Basically, the DNS protocol allows a computer to resolve a domain to an IP address, which allows a user to, for example, reach BMW’s main website by typing “bmw.com” instead of writing an IP address that is hard to remember. DNS is used almost everywhere. As a core protocol of the internet, lots of attack vectors directly target DNS, including DNS spoofing, domain hijacking, and cache poisoning (just to name a few). EXAMPLE In 2016, the DNS service provided by a company called Dyn was attacked. This resulted in major outages across most of the US, leaving millions of Americans unable to access or use internet services.
DNS is one of the core protocols used on the internet. Basically, the DNS protocol allows a computer to resolve a domain to an IP address, which allows a user to, for example, reach BMW’s main website by typing “bmw.com” instead of writing an IP address that is hard to remember. DNS is used almost everywhere. As a core protocol of the internet, lots of attack vectors directly target DNS, including DNS spoofing, domain hijacking, and cache poisoning (just to name a few). EXAMPLE In 2016, the DNS service provided by a company called Dyn was attacked. This resulted in major outages across most of the US, leaving millions of Americans unable to access or use internet services.
Signup and view all the answers
SQL allows users to query databases. SQL injection is the placement of malicious code in SQL queries, usually via web page input. A successful attack allows common commands to be run. This can include deleting the database itself. SQL injection is one of the most common web hacking techniques. EXAMPLE In the UK, two teenagers managed to target TalkTalk's website in 2015 to steal hundreds of thousands of customer records from a database that was remotely accessible.
SQL allows users to query databases. SQL injection is the placement of malicious code in SQL queries, usually via web page input. A successful attack allows common commands to be run. This can include deleting the database itself. SQL injection is one of the most common web hacking techniques. EXAMPLE In the UK, two teenagers managed to target TalkTalk's website in 2015 to steal hundreds of thousands of customer records from a database that was remotely accessible.
Signup and view all the answers
______ person, organization, or country is immune to the dangers of cyber attacks.
______ person, organization, or country is immune to the dangers of cyber attacks.
Signup and view all the answers
Cyber attacks are ______ in number and constantly evolving.
Cyber attacks are ______ in number and constantly evolving.
Signup and view all the answers
______ attacks on organizations are commonly reported in the news.
______ attacks on organizations are commonly reported in the news.
Signup and view all the answers
Phishing attacks are the most effective on a personal basis.
Phishing attacks are the most effective on a personal basis.
Signup and view all the answers
Malware attacks are increasing in number and constantly evolving.
Malware attacks are increasing in number and constantly evolving.
Signup and view all the answers
What is a DoS attack?
What is a DoS attack?
Signup and view all the answers
Give an example of a DoS attack.
Give an example of a DoS attack.
Signup and view all the answers
What is a DDoS attack?
What is a DDoS attack?
Signup and view all the answers
Give an example of a DDoS attack.
Give an example of a DDoS attack.
Signup and view all the answers
What are the machines collectively known as in DDoS attacks?
What are the machines collectively known as in DDoS attacks?
Signup and view all the answers
What is a MitM attack?
What is a MitM attack?
Signup and view all the answers
Give an example of a MitM attack.
Give an example of a MitM attack.
Signup and view all the answers
What is the goal of phishing attacks?
What is the goal of phishing attacks?
Signup and view all the answers
What is a representative sample of types of cyber attacks?
What is a representative sample of types of cyber attacks?
Signup and view all the answers
How are cyber attacks often carried out?
How are cyber attacks often carried out?
Signup and view all the answers
What is the purpose of a DDoS attack?
What is the purpose of a DDoS attack?
Signup and view all the answers
What is the difference between a DoS attack and a DDoS attack?
What is the difference between a DoS attack and a DDoS attack?
Signup and view all the answers
What is phishing?
What is phishing?
Signup and view all the answers
What is malware?
What is malware?
Signup and view all the answers
What is a MitM attack?
What is a MitM attack?
Signup and view all the answers
What is DNS?
What is DNS?
Signup and view all the answers
What are some examples of DNS attacks?
What are some examples of DNS attacks?
Signup and view all the answers
What is the purpose of a DoS attack?
What is the purpose of a DoS attack?
Signup and view all the answers
What is the main difference between a DoS attack and a DDoS attack?
What is the main difference between a DoS attack and a DDoS attack?
Signup and view all the answers
What is the goal of phishing attacks?
What is the goal of phishing attacks?
Signup and view all the answers
What is a phishing attack?
What is a phishing attack?
Signup and view all the answers
What is a spear phishing attack?
What is a spear phishing attack?
Signup and view all the answers
What is malware?
What is malware?
Signup and view all the answers
What is a Man in the Middle (MitM) attack?
What is a Man in the Middle (MitM) attack?
Signup and view all the answers
What is a DNS attack?
What is a DNS attack?
Signup and view all the answers
What is an SQL injection attack?
What is an SQL injection attack?
Signup and view all the answers
What are the types of cyber attacks impacting organizations and individuals today?
What are the types of cyber attacks impacting organizations and individuals today?
Signup and view all the answers
What is the purpose of the Kaspersky Cyberthreat Real-Time Map?
What is the purpose of the Kaspersky Cyberthreat Real-Time Map?
Signup and view all the answers
What is a DDoS attack?
What is a DDoS attack?
Signup and view all the answers
What is the impact of cyber attacks on organizations and individuals?
What is the impact of cyber attacks on organizations and individuals?
Signup and view all the answers