Cyber Security / Threats of Cyber Security

Cyber security threat Details
Malware It is malicious software installed into the system when the user clicks a malicious link or email. Once installed can block access to critical components of your network, damage your system, and gather confidential information. Malware Examples: spyware, ransomware, viruses, and worms
Phishing Cybercriminals (Attacker / intruders / Hackers) send tricked malicious emails that seem to come from legitimate resources which leads to malware installation or disclosure of sensitive information like credit card details and login credentials.
Spear Phishing It is a form of a phishing attack, targets only privileged users such as system administrators and executives.
Man in the Middle Attack Cyber criminals (Attacker / intruders / Hackers) takes place between the sender and receiver in a communication and interprets the communication can filter and steal sensitive data and return different responses to the user.
Denial of Service Attack In DOS the Attacker attacks the systems, networks, or servers by flooding systems with massive traffic which makes the system unable to fulfill legitimate requests. This is known as a Denial of Service (DDoS) attack.
SQL Injection Here the Attacker attempts to access the database by uploading malicious SQL scripts. Once does he can do the CRUD operations on SQL database.
Zero-day Exploit Here Attacker exploits the vulnerability before a patch or solution is implemented when software / hardware vulnerability is announced.
Advanced Persistent Threats (APT) It Attacker gains unauthorized access to a system / network remains undetected for an extended time.
DNS Attack It is used by Attacker to divert site visitors to malicious pages (DNS Hijacking) and data from compromised systems (DNS Tunneling).
Password Attacks Use strong password so that the attacker cant crack the password to use the system present in the network..


Home     Back