Cyber security threat |
Details |
Malware |
It is malicious software installed into the system when the user clicks a
malicious link or email. Once installed can block access to critical components
of your network, damage your system, and gather confidential information.
Malware Examples: spyware, ransomware, viruses, and worms |
Phishing |
Cybercriminals (Attacker / intruders / Hackers) send tricked malicious emails
that seem to come from legitimate resources which leads to malware installation
or disclosure of sensitive information like credit card details and login
credentials. |
Spear Phishing |
It is a form of a phishing attack, targets only privileged users such as system
administrators and executives. |
Man in the Middle Attack |
Cyber criminals (Attacker / intruders / Hackers) takes place between the sender
and receiver in a communication and interprets the communication can filter and
steal sensitive data and return different responses to the user. |
Denial of Service Attack |
In DOS the Attacker attacks the systems, networks, or servers by flooding
systems with massive traffic which makes the system unable to fulfill legitimate
requests. This is known as a Denial of Service (DDoS) attack. |
SQL Injection |
Here the Attacker attempts to access the database by uploading malicious SQL
scripts. Once does he can do the CRUD operations on SQL database. |
Zero-day Exploit |
Here Attacker exploits the vulnerability before a patch or solution is
implemented when software / hardware vulnerability is announced. |
Advanced Persistent Threats (APT) |
It Attacker gains unauthorized access to a system / network remains undetected
for an extended time. |
DNS Attack |
It is used by Attacker to divert site visitors to malicious pages (DNS
Hijacking) and data from compromised systems (DNS Tunneling). |
Password Attacks |
Use strong password so that the attacker cant crack the password to use the
system present in the network.. |