Cyber Attacks

Cyber Attacks 

Denial-Of-Service (Dos) and distributed denial-of-service (DDoS) 

 It’s a cyber attack which actually floods the targeted system as a result shutting down the resources and makes the service paralyze for a certain period of time. It’s an Illegal Act which could result in imprisonment as well as fine. 

Phishing Attacks 

 Phishing is actually an fraudulent attempt to bring the user in to trap and then fetch usernames, passwords, banking & credit card details 

Spear Phishing Attacks

 Spear phishing attacks are also email type attacks, and they are done targeting any single user or a particular user. On clicking the link, some specific malware is inserted into the computer.

Password Attacks 

These are the most common attacks, This is done with the help of a tool which tries to login using a number of permutations  and combinations. To stop these types of attacks we have a technology at present in place ie; CAPTCHA – Completely Automated Public Turing Test to Tell Computers and Humans Apart. 

SQL Injection Attacks 

It’s a type of Attack which allows SQL queries to be executed. Main Objective of these attacks are to tamper the existing data. 

Malware Attacks 

 Malware Attacks  are done by installing some malicious software on a device and then try to fetch useful or sensitive information. These Malware software hampers the device in many ways, sends sensitive information to receivers end, damages performance of the device, takes controls of settings & useful hardware resources and keeps on compromising on the security of the host hardware.

Ransomware Attacks 

 It’s a Attack where victims are asked for ransom. Technology behind that attack is that the data gets encrypted by the hacker and there is no guarantee even if after paying ransom, you get your files back.

Trojan Horses

 Trojan is actually damaging, they actually disrupt the normal flow of the system. Those malware’s are distributed via downloading software from unsecured sources or email attachments etc.

Brute – Force Attack 

It’s actually an attempt to crack the security password or access. It’s a primitive method but is still used these days. 

AI- Power Attacks 

 This is The Type of attack in which malware first learns the psyche of the user and based upon that behavior the attack is initiated.