Please enable JavaScript.
Coggle requires JavaScript to display documents.
Cyber Threats - Coggle Diagram
Cyber Threats
-
-
-
Cross-site scripting
an attacker injects a malicious script into user-provided input, attackers can also carry out an attack by modifying a request[3]
-
-
The attacker can use the stolen cookies to impersonate the user, access sensitive data[4]
Denial-of-service attack
overwhelming or flooding a targeted machine with requests until normal traffic is unable to be processed[7]
-
-
SQL injection
Allows attacker to access personal information like credit card details, passwords[1]
-
placement of malicious code in SQL statements, via web page input[2]
Phishing
uses email (traditional phishing), phone (vishing or voice phishing) or text (smishing or SMS phishing) to entice individuals into providing personal or sensitive information[5]
-
-