0 ratings 0% found this document useful (0 votes) 30 views 13 pages 9 Cyberattacksanditstypes
Cyber-attacks are malicious attempts to breach information systems, often for economic gain or data destruction. Common types include malware, phishing, Man-in-the-Middle attacks, Denial of Service attacks, SQL injection, zero-day exploits, password attacks, cross-site scripting, and root kits. Each type of attack has distinct methods and impacts, highlighting the need for robust cybersecurity measures to prevent and mitigate these threats.
AI-enhanced title and description
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here .
Available Formats
Download as PDF or read online on Scribd
Go to previous items Go to next items
Save 9_Cyberattacksanditstypes For Later
Cyber-Attacks
Cyber-attacks are increasingly common, A cyber-attack is
when an individual or an organization maliciously attempts to
breach the information system of another individual or
organization. While there is generally an economic goal, some recent
attacks show destruction of data as a goal.
Most Common Types of Cybersecurity Attacks
1. Malware:
Malware enclose various types of attacks including spyware,
viruses, worms, trojans and rootkits. Malware uses a vulnerability
(weakness) in a computer system to breach a network when a user
clicks a planted or malicious dangerous link or dispatch attachment
(software or application), which is used to install malicious software
or service or application inside the system called Malware.
Malware and malicious lines inside a computer system can:
© Deny access to the critical factors or components of the
network
© Gain information by retrieving data from the hard drive
© Disrupt the system or indeed rendering it inoperable.Malware is so common that there's a large variety of modus
operandi. The most common types being:
Viruses:
These infect operations attaching themselves to the
zation sequence. The virus replicates itself, infecting other law
in the computer system. Viruses can also attach themselves to
executable law or associate themselves with a train by creating a
contagion train with the same name but with an .exe extension,
therefore creating a bait which carries the virus.
Trojans:
This is a program caching inside useful program with vicious
purposes. Unlike a virus, a trojan do not clone itself & its commonly
used to establish a backdoor to live exploited on a remote machine
by attackers or hackers.
Worms:
Unlike viruses, Worms do not attack the host, being tone
contained programs that propagate across networks and computers.
Worms are frequently installed through dispatch attachments,
transferring a dupe of themselves to every contact in the infected
computer dispatch list. They're generally used to load a dispatch
server and achieve a denial-of- service attack.
Ransomware:
It is a type of malware that denies access to the victim data,
hanging to publish or cancel it unless a rescue is paid. Advanced
ransomware uses crypto viral gouging, cracking the victim’s data so
that it's impossible to decipher without the decryption key.Spyware
It is a type of program installed to collect information about
druggies, their systems or browsing habits, transferring the data to
a remote stoner. The attacker can also use the information for
blackmailing purposes or download and install other malicious
programs from the web.
2. Phishing:
Phishing attacks are very common and involve
sending largescale fraudulent emails to unsuspecting users, coming
from a trusted source. Fraudulent emails are often legitimate, but
link the recipient to a malicious file or script that controls or
recollects malicious scripts to allow attackers access to your device. /
Is designed to install files, or extract data such as user information. ,
Financial information, and more.
Phishing attacks can cause from social networks & other online
communities & social applications , through direct messages
through hidden intent from public (other users). Phishers often use
social engineering and other public information sources to gather
information about your work, interests, and activities to help
convince attackers that they are not. they say.
The types of phishing attacks include:
Spare phishing:
It is a targeted attacks on specific companies and / or
individuals.
Wheeling:
Attacks targeting senior executives & CEO's and stockholders
of an organization.Farming:
DNS takes advantage of cash poisoning to obtain user
credentials through a fake login landing page.
Phishing attacks can also occur through phone calls (voice phishing)
and text messages (SMS phishing). This post highlights additional
details about phishing attacks; how to detect them and how to
prevent them.
3. Man-in-the-Middle (MitM) Attacks:
This Occurs when an attacker interrupts a two-way
transaction, intervening. From there, cyber attackers can disrupt
traffic and steal data and manipulate.
These kinds of attacks usually take advantage of security
vulnerabilities or weakness in a network, such as insecure public
WIFI, to insert itself between the visitor's device and the network.
We face difficulty in analysis of this kinds of attacks. This kind of
attacks very difficult to detect because the victim (The person which
is being hacked) thinks that the information is reaching a legitimate
(required) destination. Phishing or malware attacks are often used
to carry out MitM attacks.4. Denial of Service (DOS) attack:
DOS attacks work through traffic systems, servers, and / or
networks to overload resources and bandwidth, As a result, the
system is unable to process and process legitimate requests.
There are also distributed Daniel of Service (DDoS) attacks for
addition in denial of service (DoS) attacks, DoS attacks target on
system resources with the goal of disrupting response to service
requests and computer behaves abnormally. While DDoS attack is
initiated or initialized by several infected host machines aimed at
obt ig a denial of service and taking the system offline.
The most common types of DoS and DDoS attacks are TCP SYN
Flood Attack, Tear Drop Attack, Summer Attack, Ping of Death
Attack, and Botnets.
5. MySQL injection:
SQL injection happens when an attacker or hacker inject
malicious code into the server using server query language (SQL)
which forces the server to provide secure information and secure
data. This type of attack mostly involves submitting or sending or
uploading malicious code to comments on an unsafe website or
search box. Secure coding or programming methods such as
statements generated with parameterized queries are an effective
way in prevention of SQL (Structured Query Language) injection.
When the MySQL command uses parameters instead of entering
values directly, it may allow the backend to run malicious queries.
Additionally, SQL Translator uses the parameter only as data,
without having to execute it as code. Learn more about how secure
coding methods can prevent SQL injection.6. Exploitation of zero days:
Zero Day Exploit is meant to take advantage of the weakness
of the network when it is new and recently announced - before the
patch is released and / or implemented. Zero Day attackers jump on
the revealed threat in a small window of time where there is no
solution / prevention. Thus, preventing zero-day attacks requires
constant monitoring, active detection, and active risk management
methods.
7. Password attack:
Passwords are the most comprehensive way to verify access to
a secure information system, making them an attractive target for
cyber attackers. The attacker can gain access to confidential or
important data and systems, including the ability to manipulate and
control the said data / system by gaining access to a person's
password.
Password attackers use a variety of methods to identify individual
passwords, including using social engineering, accessing password
databases, checking network connections to obtain unencrypted
passwords, or simply Guess what
The last-mentioned method is performed in a systematic way called
"Brute Force Attack". Brute Force uses a program to test the
combination of all possible types and information to guess the attack
password.Another common method is a dictionary attack, when an attacker
uses a list of common passwords to try to gain access to a user's
computer and network. Account lockout best practices and two-
factor authentication are very useful in preventing password
attacks, The Account Lockout feature can freeze the account after
numerous incorrect password attempts and adds an extra layer of
two-factor authentication secu:
y, allowing the logging user to
access only the secondary available on their 2FA device. The code
needs to be entered.
8. Cross-site scripting:
Cros scripting attack sends malicious scripts into the
content of trusted websites. The malicious code is included in the
dynamic content that is sent to the victim's browser. Typically, this
malicious code consists of JavaScript code that is executed through
the victim's browser, but may include Flash, HTML, and XSS.
9. Root kits:
Root kits are installed within legitimate software, where they
can access remote control and administration level on the
Then The attacker use root kit to steal or hack or dump passwords,
keys, secret credentials and retrieve important data and
information. As rootkit malwares are hidden in legitimate software,
once you allow the program to make changes to your OS (Operating
Systems), the rootkit malware installs itself on the system (host,
computer, server, ete.) and until then Remains active until the
attacker activates it or activates it consistently. Mechanism Route
kits are usually spread through email attachments and downloads
from insecure websites.