1) Cyber Security
1) Cyber Security
Cybersecurity refers to the practice of protecting systems, networks, and data from digital
attacks, unauthorized access, damage, or theft. It involves a variety of technologies,
processes, and practices designed to safeguard critical infrastructure, sensitive information,
and individuals from cyber threats.
Categories of Cyber-attacks:
Cyber-attacks can be categorized based on their objectives, methods, and targets.
Understanding these categories helps in identifying potential threats and implementing
appropriate defense mechanisms. Here are some common categories of cyber-attacks:
1. Malware Attacks
Malware (short for "malicious software") refers to any software intentionally designed to
cause damage to a computer, server, client, or network.
Viruses: Malicious programs that attach themselves to legitimate files and spread to other
files and systems.
Worms: Standalone malware that replicates itself to spread to other computers without
human intervention.
Trojan Horses: Malicious programs disguised as legitimate software to trick users into
installing them.
Ransomware: Malware that encrypts a victim's data and demands payment (ransom) for
the decryption key.
Spyware: Software that secretly monitors user activity and gathers information without
their consent.
Adware: Malware that automatically displays or downloads advertising material when a
user is online.
2. Phishing Attacks
Phishing is a type of social engineering attack where attackers deceive individuals into
providing sensitive information (such as passwords, credit card numbers) by pretending to be
a trustworthy entity.
Email Phishing: Attackers send fraudulent emails that appear to be from reputable sources.
Spear Phishing: Targeted phishing attacks aimed at a specific individual or organization.
Whaling: Phishing attacks aimed at high-profile individuals such as executives or
celebrities.
Vishing (Voice Phishing): Phishing attacks conducted over the phone.
Smishing (SMS Phishing): Phishing attacks conducted via SMS (text messages).
3. Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks
DoS Attacks: Attackers flood a target system with excessive requests, overwhelming it and
rendering it unable to function properly.
DDoS Attacks: Similar to DoS attacks, but launched from multiple compromised systems
(botnets), making it more difficult to stop.
4. Man-in-the-Middle (MitM) Attacks
In MitM attacks, attackers secretly intercept and relay communications between two parties
who believe they are directly communicating with each other.
Session Hijacking: Attackers steal a session token to impersonate the user and gain
unauthorized access.
Eavesdropping: Attackers listen to or intercept communications without the consent of the
communicating parties.
5. SQL Injection Attacks
In SQL injection attacks, attackers exploit vulnerabilities in web applications to inject
malicious SQL statements, allowing them to manipulate the backend database.
Classic SQL Injection: Attackers insert or "inject" malicious code into a query.
Blind SQL Injection: Attackers infer database information by asking true or false
questions to the database.
6. Zero-Day Exploits
Zero-day exploits are attacks that target previously unknown vulnerabilities in software,
hardware, or firmware, giving developers "zero days" to fix the issue before it's exploited.
7. Advanced Persistent Threats (APTs)
APTs involve a prolonged and targeted cyber attack in which an intruder gains access to a
network and remains undetected for an extended period, often to steal sensitive data.
Phases of APTs: Initial intrusion, expansion of access, data exfiltration, and maintaining
persistence.
8. Insider Threats
Insider threats involve attacks from within the organization, where current or former
employees, contractors, or business partners misuse their access to compromise the security
of the organization.
Intentional Insider Threats: Malicious activities performed by insiders with the intent to
harm the organization.
Unintentional Insider Threats: Security breaches caused by careless or negligent insiders.
9. Social Engineering Attacks
Social engineering involves manipulating individuals into divulging confidential
information or performing actions that compromise security.
Pretexting: Attackers create a fabricated scenario (pretext) to trick the victim into
providing information.
Baiting: Attackers offer something enticing to lure victims into a trap, such as a free
download that installs malware.
Tailgating: Gaining unauthorized access to a physical location by following someone with
authorized access.
10. Credential-based Attacks
Credential-based attacks involve stealing or guessing user credentials (usernames,
passwords) to gain unauthorized access to systems.
Brute Force Attack: Attackers try every possible combination of passwords until they find
the correct one.
Credential Stuffing: Attackers use lists of stolen usernames and passwords to gain access
to multiple accounts.
11. Ransomware Attacks
Ransomware is a type of malware that encrypts the victim's data and demands a ransom for
the decryption key. It can spread through phishing emails, malicious downloads, or
vulnerabilities in software.
12. Cross-Site Scripting (XSS) Attacks
In XSS attacks, attackers inject malicious scripts into webpages viewed by other users.
These scripts can be used to steal cookies, session tokens, or other sensitive information.