Get Started. It's Free
or sign up with your email address
Rocket clouds
Attacks by Mind Map: Attacks

1. Malware

1.1. Infecting

1.1.1. Viruses

1.1.1.1. Program

1.1.1.2. Macro

1.1.1.3. Resident

1.1.1.4. Boot Virus

1.1.2. Worms

1.2. Concealing

1.2.1. Trojan Horses

1.2.2. Logic Bombs

1.2.3. Backdoors

1.2.4. Rootkits

1.3. Malware for Profit

1.3.1. Bootnets

1.3.2. Ransomware

1.3.3. Scamware

1.3.4. Spyware

1.3.4.1. Adware

1.3.4.2. Keyloggers

2. Social Engineering Attacks

2.1. Physiological

2.1.1. Impersonation

2.1.2. Phishing

2.1.2.1. Pharming

2.1.2.2. Spear Phishing

2.1.2.3. Whaling

2.1.2.4. Vishing

2.1.3. Spam

2.1.3.1. Text-Based Spam

2.1.3.2. Image Spam

2.1.4. Spim

2.2. Physical

2.2.1. Dumpster Diving

2.2.2. Tailgating

2.2.3. Shoulder Surfing

3. Network Attacks

3.1. Denial of Service (DoS)

3.1.1. Ping Flood Attack

3.1.2. Smurf Attack

3.1.3. SYN Flood

3.1.4. Distributed denial of service (DDoS)

3.2. Interception

3.2.1. Man-in-the-middle

3.2.1.1. Active

3.2.1.2. Passive

3.2.2. Reply Attacks

3.3. Poisoning

3.3.1. ARP

3.3.2. DNS