25 Sep, 2018

Attack (or exploit)

An action taken that uses one or more vulnerabilities to realize a threat. This could be someone following

Read More →

25 Sep, 2018

Vulnerability¬†‚Äď

A weakness in some aspect or feature of a system that makes an exploit possible. Vulnerabilities can exist

Read More →

25 Sep, 2018

Threat

A negative effect or undesired event. A potential occurrence, often best described as an effect that might damage

Read More →

25 Sep, 2018

Denial-of-Service attack (DoS) and Distributed-Denial-of-Service (DDoS)

A denial of service attack is a special kind of Internet attack on a network that is carried

Read More →

25 Sep, 2018

Mapping (Eavesdropping)

Mapping (Eavesdropping) Before attacking a network, attackers try to find out some important information like IP address of

Read More →

25 Sep, 2018

Sniffing

Packet sniffing is a way of intercepting data packets travelling to a network. To capture all traffic travelling

Read More →
1 2