Attack Signature

Attack signature exploiting systems
Image Source

An Attack Signature is an arrangement of information that can be used to identify an attacker or hackers attempt to exploit a known operating system or application vulnerability. Intrusion detection systems help identify attack signatures, sending out a security alert to the security team or organization.

Related Terms: Signature, Digital Signature

Source: Symantec

CyberHoot does have some other resources available for your use. Below are links to all of our resources, feel free to check them out whenever you like. You might have seen some of these resources on our social media outlets, which are also listed below for your convenience. Give us a follow! 

Note: If you’d like to subscribe to our newsletter, visit any link above (besides infographics) and enter your email address on the right-hand side of the page, and click ‘Send Me Newsletters’. Sign up for the monthly newsletter to help CyberHoot with its mission of making the world ‘More Aware and More Secure!’

CyberHoot LinkedIn

CyberHoot Facebook

CyberHoot Twitter

Share this on your social networks. Help Friends, Family, and Colleagues become more aware and secure.