1.6.1

Forms of Attack

Test yourself

Forms of Attack

Attacks on networks come in different forms:

Illustrative background for Insider attackIllustrative background for Insider attack ?? "content

Insider attack

  • When someone in an organisation gives away access details or sensitive information.
Illustrative background for Passive attackIllustrative background for Passive attack ?? "content

Passive attack

  • When a hacker eavesdrops on a network by 'sniffing' the data packets.
Illustrative background for Social engineeringIllustrative background for Social engineering ?? "content

Social engineering

  • When a person is exploited into giving away critical information that gives access to the network or accounts.
Illustrative background for Active attackIllustrative background for Active attack ?? "content

Active attack

  • When someone uses malware or other technical methods to compromise a network's security.

Jump to other topics

1Computer Systems

1.1Data Representation

1.2Data Transmission

1.3Hardware

1.4Software

1.5The Internet & its Uses

1.6Cyber Security

1.7Automated & Emerging Technologies

2Algorithms, Programming & Logic

Unlock your full potential with Seneca Premium

  • Unlimited access to 10,000+ open-ended exam questions

  • Mini-mock exams based on your study history

  • Unlock 800+ premium courses & e-books

Get started with Seneca Premium