Types Of Cyber Attacks - Cyber Thieve

Cyber Attacks - Types


Cyber Attack is a process to compromising a system without any knowledge of the owner this system can be a personal computer of may be a server.

There are Two main type of cyber attack based on computer systems


TYPES OF CYBER ATTACKS



  1. Web Based Attack
  2. System Based Attack

Web Based Attack :

    • Virus/Malware : A type of software that is designed to replicate itself and spread to other computers, causing damage or disrupting normal computer operations.
    • Phishing  : An attempt to trick people into giving away personal information, such as passwords or credit card numbers, through fraudulent emails or websites.
    • Denial of Service (DoS) : A type of attack that aims to make a computer or network resource unavailable to its intended users by overwhelming it with traffic.
    • Man-in-the-Middle (MitM) : An attack in which an attacker intercepts and alters communications between two parties without their knowledge.
    • SQL injection : An attack that takes advantage of vulnerabilities in a website's database by injecting malicious code into an SQL statement.
    • Ransomware : A type of malware that encrypts a victim's files, making them inaccessible, and demands a ransom payment in exchange for the decryption key.
    • Advanced Persistent Threat (APT) : A type of cyber attack where an attacker establishes an unauthorized, long-term presence on a network in order to steal sensitive information.
    • Distributed Denial of Service (DDoS) : A type of attack that uses multiple computers to flood a target with traffic in order to make it unavailable.
    • Social engineering: This type of attack is designed to trick users into giving away sensitive information or perform actions that put their systems at risk.
    • Remote code execution: This type of attack allows an attacker to execute arbitrary code on a target system, typically by exploiting vulnerabilities in software.
    • Password cracking: This is an attack where a hacker attempts to gain access to a system by guessing or using automated tools to figure out a user's password.

                    System Based Attacks :

                    There are many ways to compromise a system.

                    • Virus : A computer virus is a type of malicious software that is designed to replicate itself and spread to other computers. It can cause harm to the infected computer, such as corrupting or deleting files, stealing personal information, or using the computer to launch attacks on other systems. Viruses can be spread through various means, such as email attachments, infected software downloads, or by exploiting vulnerabilities in operating systems or other software. It's important to have up-to-date anti-virus software and practice safe browsing habits in order to protect yourself from computer viruses.
                    • Bot : A computer bot is a software application that runs automated tasks over the internet. Bots can be used for a variety of purposes, such as web crawling, data scraping, or automating repetitive tasks. They can also be used for malicious purposes, such as creating fake social media accounts, spreading spam or malware, or launching denial of service attacks.

                    There are different types of bots: good bots (also known as web crawlers or spiders) used by search engines to index the web, or bad bots that are used for malicious purposes.

                    Some examples of common uses of bots include:

                    Social media bots that automatically post content or interact with other accounts

                    Chatbots that can answer customer service questions or provide other information

                    News bots that scrape news websites and aggregate the latest articles

                    Price tracking bots that monitor the prices of products on e-commerce websites

                    Bots can be implemented using various programming languages and frameworks, and can run on a variety of platforms, including servers, personal computers, and mobile devices.

                    • Worm : A computer worm is a type of malware that is similar to a virus, but with key differences. Like a virus, a worm is a self-replicating program that can spread to other computers. However, unlike a virus, a worm is able to spread on its own, without the need to attach itself to a legitimate program.

                    A worm can spread through various means, such as exploiting vulnerabilities in operating systems or software, using email or instant messaging to propagate, or by propagating via network shares.

                    Once a worm infects a computer, it can cause various types of damage, such as slowing down the performance of the infected computer, stealing personal information, or using the infected computer to launch attacks on other systems.

                    A computer worm can also propagate itself on a network, moving from one computer to another, and can potentially cause widespread damage.

                    • Trojan horse : A Trojan horse, also known simply as a Trojan, is a type of malware that disguises itself as a legitimate program or file in order to trick a user into installing it on their computer. Once installed, the Trojan can carry out a variety of malicious actions, such as stealing personal information, installing other malware, or giving an attacker remote access to the infected computer.

                    Trojans are often spread through email attachments, infected software downloads, or by exploiting vulnerabilities in operating systems or other software. They can also be spread through malicious websites, social engineering tactics, or by disguising themselves as legitimate software updates.

                    A Trojan horse can be difficult to detect and remove because it disguises itself as a harmless program. It's important to have up-to-date anti-virus software and to practice safe browsing habits in order to protect yourself from Trojans.


                    NOTE : If you fine any mistake or weakness in my article please help us to improve our content.


                    Related Topics :

                    Post a Comment

                    0 Comments
                    * Please Don't Spam Here. All the Comments are Reviewed by Admin.

                    #buttons=(Ok, Go it!) #days=(20)

                    Our website uses cookies to enhance your experience. Learn More
                    Ok, Go it!