answersLogoWhite

0

In targeted attacks, only specific IP or particular firms are targeted while in target of opportunity attacks, an attacker sends attack packets randomly to firms and see where those packets can cause of destruction.

User Avatar

Wiki User

16y ago

What else can I help you with?

Continue Learning about Computer Science

Which type of attack is it when a malicious host controls a TCP session between two users?

MITM Man-In-The-Middle attack


What type of attack does an attacker imtercept inspect and alter packets on the fly in the conversation between two networks hosts?

Middle man attack


Difference between active and passive threats?

Passive attack: So in passive attack a hacker intrudes your system, and waits for some valuable information. An example could be: A keylogger which sends the input given by the victim to a hacker via a network(LAN or Internet whatever). Active attack: In an active attack a hacker tries to get the valuable information by using his abilities rather than depending on the stupidity of the victim. An example could be: Using Brute force to crack the password of a system. Answered by: 21st Ninja GOD


What is ddosing?

Distributed Denial Of Service (DDoS) is simply using a botnet (look it up.) or a lot of infected computers to send massive amounts of large packets, ddosing can be UDP, SSYN, HTTP, Apache,and more. It can be targeted to a single individual, or can be a large website/network. DDoSing requires a large amounts of bots (infected machines) to actually do any a real damage. a DDoS attack must not be confused with a DOS attack. A DOS attack is the same thing, except it is not distributed, therefore not being as strong, and you are more likely to get caught, as it is using YOUR connection. That is my summary of DDoSing. For a full 6 page essay, please view my website at crazyx1891.t35.com


What are two types of exploitation used to attack a computer network?

accessing someone email or personal details Cyber stalking

Related Questions

What is the difference between an attack and an exploit?

Yo girl attack these nuts


What is the difference between threat and attack?

ta mere


What is the difference between a threat and an attack?

in simple terms; An attack tends to be an act which is in process. A threat tends to be a promise of an attack to come.


What is the difference between the angle of attack and angle of incidence?

Zero degrees.


What is the difference between differential and linear cryptanalysis?

The main difference from linear attack is that differential attack involves comparing the XOR of two inputs to the XOR of the corresponding outputs.


What is the difference between beautifly and dustdox?

The face,wing,type,attack,and the body


In yugioh If you have two monsters that cant be targeted can your opponent attack you directly?

no


What is an email attack attack targeted at senior management called?

An email attack targeted at senior management is called a whaling attack. It is a specialized form of phishing where cybercriminals impersonate executives, such as a CEO or CFO, to trick employees into transferring money, sharing confidential data, or approving fraudulent requests.


What is non q wave heart attack?

No. I had an MI confirmed by elevated enzymes they told me I had a non Q wave heart attack. what is the difference between a regular heart attack and a non q wave heart attack?


What is the difference between SCD and a heart attack?

A heart attack (myocardial infarction) is the result of a blockage in an artery which feeds the heart, so the heart becomes starved for oxygen.


What is the difference between attack and attack percent in final fantasy 7?

Attack determines how much damage you will inflict on an enemy, attack percentage determines how often you will actually hit the enemy because don't forgot your enemies can evade your attacks.


What is the difference between Man in the Middle attack and a replay attack?

Man-In-The-Middle: An attack in which communications between two hosts are routed through the attacker's host. The attacker can observe, modify, and/or block selected traffic before relaying to the intended host. Communications between the target hosts appear normal.Replay: An attack in which a copy of communications between two hosts is obtained by the attacker. The attacker retransmits selected portions of the copied communications at a later time for nefarious purposes such as creating duplicate transactions, circumventing authentication, etc.diffrent: a replay attack is a more specific type of man-in-the-middle attack. I view the biggest difference in the intent. In the man-in-the-middle attack the intent is simply to capture the data, but in a replay attack the intent is to reuse the data in an an attack.