Please enable JavaScript to use CodeHS

Tennessee Cybersecurity II: C10H20.3.1

CodeHS Lessons

Analyze and differentiate among various types of attacks on systems and networks. Create a table or other graphic organizer that lists the following types of attacks and details their purposes and characteristics. Different types of attacks can include but are not limited to: a. Virus b. Worms c. Trojans d. Unpatched software e. Password cracking f. Advanced persistent threat g. Reconnaissance/footprinting h. Infiltration i. Network breach j. Network exploitation k. Attack for effects (e.g., deceive, disrupt, degrade, and destroy) l. DoS/DDoS, session hijacking m. HTTP spoofing n. DNS attacks o. Switch attacks p. Man-in-the-middle (MITM) attacks q. Cross site scripting r. Drive-by-attacks

Standard
3.3 Common Network Attacks
3.4 Additional Attacks
Standard
8.5 Common Network Attacks
8.6 Additional Attacks
Standard
13.3 Common Network Attacks
13.4 Additional Attacks
Standard
5.3 Common Network Attacks
5.4 Additional Attacks