Disclaimer: This is a user generated content submitted by a member of the WriteUpCafe Community. The views and writings here reflect that of the author and not of WriteUpCafe. If you have any complaints regarding this post kindly report it to us.

A cyber attack is a deliberate attempt to breach computer systems or networks by using malicious softwares to disrupt the system. It can be launched from one or more computers against one or multiple computers networks. Cyber attacks lead to practices like frauds, information theft, ransomware schemes, etc.

Types of Cyber Attacks

Common Types of Cyber attacks are as follows:

malware

1. Malware

Malware is short term for Malicious Software which includes viruses, worms, spyware, trojans, and ransomware. When the user clicks on a malicious link or an email attachment, it gets installed on the system. Once it is installed on the system, it can do harmful activities such as Blocks access to the data and programs on the system, Steals information.

E.g. of Malware is Ransomware. It encrypts data on the victim’s system and then demands a ransom in exchange for the code for decryption which makes the system usable again or access to the blocked data.

Know more about the cyber security consultants.

2. Phishing

Phishing is an attempt to steal sensitive information like usernames, passwords, bank account details or to install malware by using emails which appears to be from a trusted source. It starts to work when the target user opens the link from an email and provides login details or other private information to the fake source

Eg: Phishing website. After that, the attacker collects this credentials and uses it on a legitimate website for harmful actions. This works just like a fisherman uses bait to catch a fish.

ddos

3. Denial of Service (DOS) and Distributed DOS (DDOS) Attack

A Denial of Service attack floods networks, servers or surrounding infrastructure with traffic to consume bandwidth and resources. After the specific time and traffic server can no longer effectively process incoming requests, it denies other incoming request services.

Login

Welcome to WriteUpCafe Community

Join our community to engage with fellow bloggers and increase the visibility of your blog.
Join WriteUpCafe