0% found this document useful (0 votes)
30 views13 pages

9 Cyberattacksanditstypes

Cyber-attacks are malicious attempts to breach information systems, often for economic gain or data destruction. Common types include malware, phishing, Man-in-the-Middle attacks, Denial of Service attacks, SQL injection, zero-day exploits, password attacks, cross-site scripting, and root kits. Each type of attack has distinct methods and impacts, highlighting the need for robust cybersecurity measures to prevent and mitigate these threats.

Uploaded by

virtualsvc9
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
30 views13 pages

9 Cyberattacksanditstypes

Cyber-attacks are malicious attempts to breach information systems, often for economic gain or data destruction. Common types include malware, phishing, Man-in-the-Middle attacks, Denial of Service attacks, SQL injection, zero-day exploits, password attacks, cross-site scripting, and root kits. Each type of attack has distinct methods and impacts, highlighting the need for robust cybersecurity measures to prevent and mitigate these threats.

Uploaded by

virtualsvc9
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
Cyber-Attacks Cyber-attacks are increasingly common, A cyber-attack is when an individual or an organization maliciously attempts to breach the information system of another individual or organization. While there is generally an economic goal, some recent attacks show destruction of data as a goal. Most Common Types of Cybersecurity Attacks 1. Malware: Malware enclose various types of attacks including spyware, viruses, worms, trojans and rootkits. Malware uses a vulnerability (weakness) in a computer system to breach a network when a user clicks a planted or malicious dangerous link or dispatch attachment (software or application), which is used to install malicious software or service or application inside the system called Malware. Malware and malicious lines inside a computer system can: © Deny access to the critical factors or components of the network © Gain information by retrieving data from the hard drive © Disrupt the system or indeed rendering it inoperable. Malware is so common that there's a large variety of modus operandi. The most common types being: Viruses: These infect operations attaching themselves to the zation sequence. The virus replicates itself, infecting other law in the computer system. Viruses can also attach themselves to executable law or associate themselves with a train by creating a contagion train with the same name but with an .exe extension, therefore creating a bait which carries the virus. Trojans: This is a program caching inside useful program with vicious purposes. Unlike a virus, a trojan do not clone itself & its commonly used to establish a backdoor to live exploited on a remote machine by attackers or hackers. Worms: Unlike viruses, Worms do not attack the host, being tone contained programs that propagate across networks and computers. Worms are frequently installed through dispatch attachments, transferring a dupe of themselves to every contact in the infected computer dispatch list. They're generally used to load a dispatch server and achieve a denial-of- service attack. Ransomware: It is a type of malware that denies access to the victim data, hanging to publish or cancel it unless a rescue is paid. Advanced ransomware uses crypto viral gouging, cracking the victim’s data so that it's impossible to decipher without the decryption key. Spyware It is a type of program installed to collect information about druggies, their systems or browsing habits, transferring the data to a remote stoner. The attacker can also use the information for blackmailing purposes or download and install other malicious programs from the web. 2. Phishing: Phishing attacks are very common and involve sending largescale fraudulent emails to unsuspecting users, coming from a trusted source. Fraudulent emails are often legitimate, but link the recipient to a malicious file or script that controls or recollects malicious scripts to allow attackers access to your device. / Is designed to install files, or extract data such as user information. , Financial information, and more. Phishing attacks can cause from social networks & other online communities & social applications , through direct messages through hidden intent from public (other users). Phishers often use social engineering and other public information sources to gather information about your work, interests, and activities to help convince attackers that they are not. they say. The types of phishing attacks include: Spare phishing: It is a targeted attacks on specific companies and / or individuals. Wheeling: Attacks targeting senior executives & CEO's and stockholders of an organization. Farming: DNS takes advantage of cash poisoning to obtain user credentials through a fake login landing page. Phishing attacks can also occur through phone calls (voice phishing) and text messages (SMS phishing). This post highlights additional details about phishing attacks; how to detect them and how to prevent them. 3. Man-in-the-Middle (MitM) Attacks: This Occurs when an attacker interrupts a two-way transaction, intervening. From there, cyber attackers can disrupt traffic and steal data and manipulate. These kinds of attacks usually take advantage of security vulnerabilities or weakness in a network, such as insecure public WIFI, to insert itself between the visitor's device and the network. We face difficulty in analysis of this kinds of attacks. This kind of attacks very difficult to detect because the victim (The person which is being hacked) thinks that the information is reaching a legitimate (required) destination. Phishing or malware attacks are often used to carry out MitM attacks. 4. Denial of Service (DOS) attack: DOS attacks work through traffic systems, servers, and / or networks to overload resources and bandwidth, As a result, the system is unable to process and process legitimate requests. There are also distributed Daniel of Service (DDoS) attacks for addition in denial of service (DoS) attacks, DoS attacks target on system resources with the goal of disrupting response to service requests and computer behaves abnormally. While DDoS attack is initiated or initialized by several infected host machines aimed at obt ig a denial of service and taking the system offline. The most common types of DoS and DDoS attacks are TCP SYN Flood Attack, Tear Drop Attack, Summer Attack, Ping of Death Attack, and Botnets. 5. MySQL injection: SQL injection happens when an attacker or hacker inject malicious code into the server using server query language (SQL) which forces the server to provide secure information and secure data. This type of attack mostly involves submitting or sending or uploading malicious code to comments on an unsafe website or search box. Secure coding or programming methods such as statements generated with parameterized queries are an effective way in prevention of SQL (Structured Query Language) injection. When the MySQL command uses parameters instead of entering values directly, it may allow the backend to run malicious queries. Additionally, SQL Translator uses the parameter only as data, without having to execute it as code. Learn more about how secure coding methods can prevent SQL injection. 6. Exploitation of zero days: Zero Day Exploit is meant to take advantage of the weakness of the network when it is new and recently announced - before the patch is released and / or implemented. Zero Day attackers jump on the revealed threat in a small window of time where there is no solution / prevention. Thus, preventing zero-day attacks requires constant monitoring, active detection, and active risk management methods. 7. Password attack: Passwords are the most comprehensive way to verify access to a secure information system, making them an attractive target for cyber attackers. The attacker can gain access to confidential or important data and systems, including the ability to manipulate and control the said data / system by gaining access to a person's password. Password attackers use a variety of methods to identify individual passwords, including using social engineering, accessing password databases, checking network connections to obtain unencrypted passwords, or simply Guess what The last-mentioned method is performed in a systematic way called "Brute Force Attack". Brute Force uses a program to test the combination of all possible types and information to guess the attack password. Another common method is a dictionary attack, when an attacker uses a list of common passwords to try to gain access to a user's computer and network. Account lockout best practices and two- factor authentication are very useful in preventing password attacks, The Account Lockout feature can freeze the account after numerous incorrect password attempts and adds an extra layer of two-factor authentication secu: y, allowing the logging user to access only the secondary available on their 2FA device. The code needs to be entered. 8. Cross-site scripting: Cros scripting attack sends malicious scripts into the content of trusted websites. The malicious code is included in the dynamic content that is sent to the victim's browser. Typically, this malicious code consists of JavaScript code that is executed through the victim's browser, but may include Flash, HTML, and XSS. 9. Root kits: Root kits are installed within legitimate software, where they can access remote control and administration level on the Then The attacker use root kit to steal or hack or dump passwords, keys, secret credentials and retrieve important data and information. As rootkit malwares are hidden in legitimate software, once you allow the program to make changes to your OS (Operating Systems), the rootkit malware installs itself on the system (host, computer, server, ete.) and until then Remains active until the attacker activates it or activates it consistently. Mechanism Route kits are usually spread through email attachments and downloads from insecure websites.

You might also like