what is the cyber attack and Types of Cyber Attacks

Today we are going to talk about what is the cyber attack.

And why cyber attack give us so much damage

 

Let’s find out

A Cyber Attack Computer System Based Technology. Risk work and deliberate exploitation of the network Cyber attacks use a wrong intention code to change computer code or data. During all cyber attacks, all your personal information can be stolen. Can use much more wrong work. Which you may have to face a lot of trouble.

Simply put, a cyber attack is an attack launched from one computer or more computers against another computer, multiple computers or networks.

Cyber attacks might be broken down into two broad types: attacks where the goal is to disable the target computer or knock it offline, or attacks where the goal is to get access to the target computer’s data and perhaps gain admin privileges on it. There are a variety of techniques attackers use to achieve those goals, including:

 

 Types of Cyber Attack

1. Malware
2. Phishing
3. Password Attacks
4. Denial-of-Service (DoS) Attacks
5. “Man in the Middle” (MITM)
6. Drive-By Downloads
7. Malvertising
8. Rogue Software
9. SQL Injection Attack
10. Cross-Site Scripting (XSS)

 

1. Malware

the Malware, or malicious software, is any program or file that is harmful to a computer user. Malware includes computer viruses, worms, Trojan horses, and spyware. These malicious programs can perform a variety of functions, including stealing, encrypting or deleting sensitive data, altering or hijacking core computing functions and monitoring users’ computer activity without their permission.

 

2. Phishing

Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message. The recipient is then tricked into clicking a malicious link, which can lead to the installation of malware, the freezing of the system as part of a ransomware attack or the revealing of sensitive information.

 

3. Password Attacks

Passwords can be difficult to remember, especially if you follow the rules to make them “strong”. They can also be fiddly to input, especially on mobile devices and small keyboards, and inconvenient and time-consuming to use considering it’s best practice to use different ones for each account. However, if a hacker determines or gains access to your security passwords, you stand to lose a lot more than your time and patience.

If all the media buzz about high-profile security breaches with millions of user credentials and passwords up for sale on the open market aren’t enough to convince you that the threat to password security is real, then a better understanding of how such attacks occur may be enough to convince you.

 

4. Denial-of-Service (DoS) Attacks

In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet. Denial of service is typically accomplished by flooding the targeted machine or resource with superfluous requests in an attempt to overload systems and prevent some or all legitimate requests from being fulfilled

 

5. Man in the Middle (MITM)

A man in the middle (MITM) attack is a general term for when a perpetrator positions himself in a conversation between a user and an application—either to eavesdrop or to impersonate one of the parties, making it appear as if a normal exchange of information is underway.

The goal of an attack is to steal personal information, such as login credentials, account details, and credit card numbers. Targets are typically the users of financial applications, SaaS businesses, e-commerce sites and other websites where logging in is required.

Information obtained during an attack could be used for many purposes, including identity theft, unapproved fund transfers or an illicit password change.

 

6. Drive-By Downloads

 

7. Malvertising

8. Rogue Software

 

9. SQL Injection Attack

10. Cross-Site Scripting (XSS)

Leave a Reply

Your email address will not be published. Required fields are marked *

FOLLOW @ INSTAGRAM