TYPES OF CYBER THREATS AND CYBER ATTACKS


Types of Cyber threats - Malwares






1.   Rootkit- is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed and often masks its existence or the existence of other software.

2.   Spyware- is a software that aims to gather information about a person or organization, without their knowledge, and send such information to another entity without the consumer's consent.

3.   Trojan- is any malware which misleads users of its true intent.

4.   Virus- is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code.

5. worm- is a standalone malware computer program that replicates itself in order to spread to other computers.

6. ADWARE- is software that generates revenue for its developer by automatically generating online advertisements in the user interface of the software or on a screen presented to the user during the installation process.

7.   LOGIC BOMBS- is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met.

8. Rogue security software- is a form of malicious software and internet fraud that misleads users into believing there is a virus on their computer and aims to convince them to pay for a fake malware removal tool that actually installs malware on their computer.


Types of cyber attacks

1.PHISHING- is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication.

 

2.CRACKING- in cryptanalysis and computer security, password cracking is the process of recovering passwords from data that have been stored in or transmitted by a computer system.

 

3.MAN IN THE MIDDLE- is an attack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other.

 

4.Drive-by DOWNLOAD -is the unintended download of computer software from the internet. 


5.BACKDOORS - is a typically covert method of bypassing normal authentication or encryption in a computer,product,embedded device on its embodim.             


6.DNS poisoning- is a form of computer security hacking in which corrupt domain name system data is introduced into the DNS resolver's cache, causing the name server to return an incorrect result record.

 

7.Clickjacking- is a malicious technique of tricking a user into clicking on something different from what the user perceives, thus potentially revealing confidential information or allowing others to take control of their computer while clicking on seemingly innocuous objects, including web pages.

 

8.Malvertising is the use of online advertising to spread malware.                

 

9.Code injectionis the exploitation of a computer bug that is caused by processing invalid data. Injection is used by an attacker to introduce code into a vulnerable computer program and change the course of execution.

 

10.Sniffing is the theft or interception of data by capturing the network traffic using a sniffer buffer overflows.

 

11.The Denial of Service Attack   is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the internet.

 



Comments

  1. Didn't know about many if these..

    ReplyDelete
  2. Never knew this much about cyber crime

    ReplyDelete

Post a Comment

Popular posts from this blog

CYBER PROTECTION METHODS

STEPS TO BE TAKEN BY A CYBER ATTACK VICTIM