Premium Resources

Different types of attacks

Types of attacks:

Operating System Attacks: 

Finding OS Vulnerabilities and Exploit them For.eg. buffer overflow, un-patched system.

Misconfiguration Attacks: 

Targeted towards databases, networks, web servers, application platforms etc, It Happens due to the misconfiguration of the deployed devices or system.

Application Level Attacks: 

Attacks are targeted towards the installed applications, e.g:  Buffer overflow, cross-site scripting, SQL injection etc.

Shrink Wrap Code Attacks: 

Using default or off the shelf components, it happens if the code/script is not fine-tuned.

Disclaimer

PMI®, PMBOK®, PMP® and PMI-ACP® are registered marks of the Project Management Institute, Inc.

The Swirl logo™ is a trade mark of AXELOS Limited.

ITIL® is a registered trade mark of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved.

PRINCE2® is a registered trade mark of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved.

IASSC® is a registered trade mark of International Association for Six Sigma Certification.

Certified ScrumMaster® (CSM) is a registered trade mark of SCRUM ALLIANCE®

CISSP® is a registered mark of The International Information Systems Security Certification Consortium (ISC)2.

CCNA® is a trademark of Cisco.

Microsoft and MS Project are the registered trademarks of the Microsoft Corporation.

SAP Trademark(s) is/are the trademark(s) or registered trademark(s) of SAP SE in Germany.