● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● Smishing: Phishing attacks conducted through SMS messages. Dissociation Attack (also known as Deauthentication Attack) is an attack on a wireless network where the attacker sends deauthentication frames to the access point or client, causing them to disconnect. Phishing: Fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity in electronic communications. Spear Phishing: Targeted phishing attacks aimed at specific individuals or organizations. Whaling: Phishing attacks directed specifically at senior executives or other high-profile targets within a business. Vishing: Phishing attacks conducted through voice calls. Man-in-the-Middle: An attack where the attacker secretly intercepts and relays messages between two parties who believe they are directly communicating with each other. Spoofing: Deceiving a system or user by masquerading as a legitimate entity. Adware: Software that automatically displays or downloads advertising material. Trojan Horse: Malware disguised as legitimate software that, once activated, can steal information or harm the host system. Virus: Malware that attaches itself to a host file or system and spreads to other files and systems. Worm: Malware that replicates itself to spread to other computers, often exploiting vulnerabilities in network security. Zero-Day Exploit: An attack that targets a previously unknown vulnerability in software or hardware. SQL Injection: An attack that allows attackers to execute arbitrary SQL code on a database. Cross-Site Scripting (XSS): An attack where malicious scripts are injected into otherwise benign websites. Denial of Service (DoS): An attack aimed at making a service unavailable to its intended users. Distributed Denial of Service (DDoS): A large-scale DoS attack that uses multiple compromised systems to target a single system. Brute Force Attack: An attack that attempts to gain access by systematically trying every possible password combination. Credential Stuffing: An attack that uses stolen account credentials to gain unauthorized access to user accounts. Social Engineering: Manipulating individuals into divulging confidential or personal information. Backdoor: A method of bypassing normal authentication to gain unauthorized access to a system. Insider Threat: A threat posed by someone within the organization who has inside information and access. ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● Botnet: A network of private computers infected with malicious software and controlled as a group without the owners' knowledge. Keylogger: Software or hardware that records keystrokes made by a user, often to gain unauthorized access to passwords and other confidential information. Watering Hole Attack: An attack where the attacker compromises a specific group’s common online resources to infect its members. Ransomware: Malware that encrypts a user's files and demands payment for the decryption key. Rootkit: Software designed to hide the existence of certain processes or programs from normal methods of detection and enable continued privileged access to a computer. Session Hijacking: An attack where the attacker takes over a session between a user and a trusted network. Cross-Site Request Forgery (CSRF): An attack that tricks the user into performing actions they did not intend to perform. Drive-By Download: Unintended download of malicious code to a device without the user's consent or knowledge. DNS Spoofing: An attack that changes a domain name system (DNS) record to redirect traffic to a malicious site. DHCP Starvation: An attack on a network's Dynamic Host Configuration Protocol (DHCP) server, where the attacker floods the server with numerous DHCP requests, using spoofed MAC addresses. Privilege Escalation: An attack that exploits a vulnerability to gain higher-level access to resources than intended. Session Fixation: An attack where the attacker sets a user's session ID to a known value and then uses it to gain unauthorized access. Clickjacking: An attack that tricks users into clicking on something different from what they perceive, potentially revealing confidential information or allowing control of their computer. Rogue Security Software: Malicious software that deceives or misleads users into paying for fake or simulated removal of malware. Fileless Malware: Malware that operates in-memory and does not write any part of its activity to the hard drive, making it difficult to detect. Typosquatting: An attack where attackers register domain names that are misspelled versions of popular sites to deceive users. Rainbow tables: A rainbow table is a giant list of these hashes, but they’re created ahead of time for many possible passwords. Adding random data (a "salt") to each password before hashing makes rainbow tables ineffective because each password gets a unique hash.