Disclaimer: This is a user generated content submitted by a member of the WriteUpCafe Community. The views and writings here reflect that of the author and not of WriteUpCafe. If you have any complaints regarding this post kindly report it to us.

A cyber attack is a deliberate attempt to breach computer systems or networks by using malicious softwares to disrupt the system. It can be launched from one or more computers against one or multiple computers networks. Cyber attacks lead to practices like frauds, information theft, ransomware schemes, etc.

Types of Cyber Attacks

Common Types of Cyber attacks are as follows:

malware

1. Malware

Malware is short term for Malicious Software which includes viruses, worms, spyware, trojans, and ransomware. When the user clicks on a malicious link or an email attachment, it gets installed on the system. Once it is installed on the system, it can do harmful activities such as Blocks access to the data and programs on the system, Steals information.

E.g. of Malware is Ransomware. It encrypts data on the victim’s system and then demands a ransom in exchange for the code for decryption which makes the system usable again or access to the blocked data.

Know more about the cyber security consultants.

2. Phishing

Phishing is an attempt to steal sensitive information like usernames, passwords, bank account details or to install malware by using emails which appears to be from a trusted source. It starts to work when the target user opens the link from an email and provides login details or other private information to the fake source

Eg: Phishing website. After that, the attacker collects this credentials and uses it on a legitimate website for harmful actions. This works just like a fisherman uses bait to catch a fish.

ddos

3. Denial of Service (DOS) and Distributed DOS (DDOS) Attack

A Denial of Service attack floods networks, servers or surrounding infrastructure with traffic to consume bandwidth and resources. After the specific time and traffic server can no longer effectively process incoming requests, it denies other incoming request services.

No Comments
Comments to: Introduction to Cyber Attack

Trending Stories

Scope of Fashion Industry Fashion has consistently been recognised to push the limits. With new ideas and trends, fashion has a focus on the future. The fashion industry will see enormous innovation in the upcoming years as modern technology, and changing customer demands and trends will transform the industry. With such stimulation and competition, the […]

Log In

Or with username:

Forgot password?

Don't have an account? Register

Forgot password?

Enter your account data and we will send you a link to reset your password.

Your password reset link appears to be invalid or expired.

Log in

Privacy Policy

Add to Collection

No Collections

Here you'll find all collections you've created before.

Login