Friday, September 21, 2018

Threats or Attacks

Threats or Attacks


A Threat or Cyberattack is deliberate exploitation of computer systems, technology-dependent enterprises and networks.

Common Threats can include


Botnets - A collection of computers compromised by malicious code and controlled across a network.

(DoS)Denial of Service - An attack that prevents or impairs the authorized use of information system resources or services.

(DDoS)Distributed Denial of Service - A denial of service technique that uses numerous systems to perform the attack simultaneously.

Malware - Software that compromises the operation of a system

(MITM) Man-in-the-middle attack - is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.

Phishing - A digital form of social engineering to deceive individuals into providing sensitive information.

Ransomware - is a type of malware that prevents users from accessing their system or personal files and demands ransom payment in order to regain access.

Spoofing -  Faking the sending address of a transmission to gain illegal entry. The deliberate inducement of a user or resource to take incorrect action. Impersonating, masquerading, piggybacking, and mimicking are forms of spoofing.

Spyware - Software that is secretly or surreptitiously installed into an information system.

(SQLi)SQL injection - is a code injection technique, used to attack data-driven applications.

Trojan horse - A computer program that appears to have a useful function, but also has a hidden and potentially malicious function.

Virus - A computer program that can replicate itself infect a computer and then spread.

Worm - A self-replicating, self-propagating, self-contained program that uses networking mechanisms to spread itself.

(XSS)Cross-Site Scripting - is a common attack that injects malicious code into a vulnerable web application.

The process of keeping up with new technologies, security trends and threat intelligence is a challenging task.


Up Next: Penetration Testing





No comments:

Post a Comment