Capture.PNG
Document Details
Uploaded by jlopez59#
Tags
Related
- Security In Quantum Computing.pdf
- Cloud Computing Architecture Models PDF
- 4.1 Apply Common Security Techniques to Computing Resources PDF
- Comp 101: Introduction to Computing - Security and Privacy (PDF)
- Intro To Computing Lesson 5: Privacy and Security - PDF
- Apply Common Security Techniques to Computing Resources PDF
Full Transcript
## What Are We Up Against? (4 of 6) - **Zero-day attack** - When a hacker discovers a security hole in software that is unknown to the developer - A hacker takes advantage of a recently reported gap in software security before users apply patches - **Man-in-the-middle attack** - The at...
## What Are We Up Against? (4 of 6) - **Zero-day attack** - When a hacker discovers a security hole in software that is unknown to the developer - A hacker takes advantage of a recently reported gap in software security before users apply patches - **Man-in-the-middle attack** - The attacker intercepts communication between two parties and reads and/or alters the content of messages - **Denial of service** - A DoS attack overwhelms a computer or network with requests or traffic until new connections can no longer be accepted - A distributed denial-of-service (DDoS) attack happens when multiple computers are involved in the attack